Sunteți pe pagina 1din 82

2019-08-13 15:28:02.

179 (23900) SSHClientBase::run() gAuthentication = 0


2019-08-13 15:28:02.716 (23900) SSHClient_Pw::authenticate() login name: sent
2019-08-13 15:28:06.169 (23900) SSHClient_Pw::authenticate() received login name:
tsadmin
2019-08-13 15:28:06.169 (23900) SSHClient_Pw::authenticate() password prompt sent
2019-08-13 15:28:11.448 (23900) SSHClient_Pw::authenticate() password received
2019-08-13 15:28:11.448 (23900) SSHClient_Pw::authenticate() authenticating towards
10.3.16.11
2019-08-13 15:28:11.448 (23900) SSHClient_Pw::authenticate() username: tsadmin
2019-08-13 15:28:11.448 (23900) SSHClient_Pw::authenticate() length(password): 16
2019-08-13 15:28:18.194 (23900) SSHClient_Pw::authenticate() AuthenticatePw()
failed ssh->lastErrorText(): ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
passwordAuth:
Sent login/password
Authentication failed or partial success. (1)
PartialSuccess1: 0
AuthList: publickey,password,keyboard-interactive
important:
This is likely a simple invalid login and/or password error,
meaning your application did not send the correct login and/or password.
--important
--passwordAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-08-13 15:28:18.194 (23900) SSHClient_Pw::authenticate()


get_PasswordChangeRequested() == false
2019-08-13 15:28:18.194 (23900) SSHClient_Pw::authenticate() is connected,
authentication failure towards 10.3.16.11
ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
Connected.
--IsConnected
--ChilkatLog

2019-08-13 15:28:18.194 (23900) SSHClient_Pw::retryAuthenticate() password prompt


sent
2019-08-13 15:28:24.797 (23900) SSHClient_Pw::retryAuthenticate() password received
2019-08-13 15:28:24.797 (23900) SSHClient_Pw::retryAuthenticate() authenticating
towards 10.3.16.11
2019-08-13 15:28:30.893 (23900) SSHClient_Pw::authenticate() authentication failure
towards 10.3.16.11
2019-08-13 15:28:30.893 (23900) SSHClient_Pw::authenticate() ssh->lastErrorText():
ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
passwordAuth:
Sent login/password
Authentication failed or partial success. (1)
PartialSuccess1: 0
AuthList: publickey,password,keyboard-interactive
important:
This is likely a simple invalid login and/or password error,
meaning your application did not send the correct login and/or password.
--important
--passwordAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-08-13 15:28:30.893 (23900) SSHClient_Pw::retryAuthenticate() password prompt


sent
2019-08-13 15:28:58.803 (23900) SSHClient_Pw::retryAuthenticate() password received
2019-08-13 15:28:58.803 (23900) SSHClient_Pw::retryAuthenticate() authenticating
towards 10.3.16.11
2019-08-13 15:29:03.976 (23900) SSHClient_Pw::authenticate() authentication failure
towards 10.3.16.11
2019-08-13 15:29:03.977 (23900) SSHClient_Pw::authenticate() ssh->lastErrorText():
ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
passwordAuth:
Sent login/password
Authentication failed or partial success. (1)
PartialSuccess1: 0
AuthList: publickey,password,keyboard-interactive
important:
This is likely a simple invalid login and/or password error,
meaning your application did not send the correct login and/or password.
--important
--passwordAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-08-13 15:29:03.977 (23900) SSHClient_Pw::retryAuthenticate() password prompt


sent
2019-08-13 15:29:18.675 (6052) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-08-13 15:29:18.695 (23900) SSHClient_Pw::retryAuthenticate() password received
2019-08-13 15:29:18.695 (23900) SSHClient_Pw::retryAuthenticate() authenticating
towards 10.3.16.11
2019-08-13 15:29:18.703 (23900) SSHClient_Pw::authenticate() authentication failure
towards 10.3.16.11
2019-08-13 15:29:18.703 (23900) SSHClient_Pw::authenticate() ssh->lastErrorText():
ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
Received DISCONNECT message
DisconnectReason: Too many authentication failures for tsadmin
Error reading userauth response.
userAuthResponse: Socket connection closed.
--sshAuthenticatePw
Socket connection lost.
Failed.
--AuthenticatePw
--ChilkatLog

2019-08-13 15:29:18.703 (23900) SSHClientBase::run() failed to authenticate ssh-


>lastErrorText(): ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
No connection.
--IsConnected
--ChilkatLog

2019-08-13 15:29:18.703 (23900) SSHClientBase::run() - Calling


cleanupTerminalType()
2019-08-13 15:29:18.703 (23900) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-08-13 15:29:18.711 (23900) SSHClientBase::run() - Calling ssh->Disconnect()
2019-08-13 15:29:18.711 (23900) SSHClientBase::run() - Calling ssh->Dispose()
2019-08-13 15:29:18.711 (23900) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-08-13 15:29:18.721 (6052) SshLogFile::~SshLogFile() - Destroying object
2019-08-13 17:41:07.405 (22276) SSHClientBase::run() gAuthentication = 0
2019-08-13 17:41:07.851 (22276) SSHClient_Pw::authenticate() login name: sent
2019-08-13 17:41:11.095 (22276) SSHClient_Pw::authenticate() received login name:
tsadmin
2019-08-13 17:41:11.095 (22276) SSHClient_Pw::authenticate() password prompt sent
2019-08-13 17:41:16.724 (22276) SSHClient_Pw::authenticate() password received
2019-08-13 17:41:16.724 (22276) SSHClient_Pw::authenticate() authenticating towards
10.3.6.5
2019-08-13 17:41:16.724 (22276) SSHClient_Pw::authenticate() username: tsadmin
2019-08-13 17:41:16.724 (22276) SSHClient_Pw::authenticate() length(password): 16
2019-08-13 17:41:21.154 (22276) SSHClient_Pw::authenticate() AuthenticatePw()
failed ssh->lastErrorText(): ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
passwordAuth:
Sent login/password
Authentication failed or partial success. (1)
PartialSuccess1: 0
AuthList: publickey,password,keyboard-interactive
important:
This is likely a simple invalid login and/or password error,
meaning your application did not send the correct login and/or password.
--important
--passwordAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-08-13 17:41:21.154 (22276) SSHClient_Pw::authenticate()


get_PasswordChangeRequested() == false
2019-08-13 17:41:21.154 (22276) SSHClient_Pw::authenticate() is connected,
authentication failure towards 10.3.6.5
ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
Connected.
--IsConnected
--ChilkatLog

2019-08-13 17:41:21.154 (22276) SSHClient_Pw::retryAuthenticate() password prompt


sent
2019-08-13 17:41:36.699 (6052) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-08-13 17:41:36.730 (22276) SSHClient_Pw::retryAuthenticate() password received
2019-08-13 17:41:36.730 (22276) SSHClient_Pw::retryAuthenticate() authenticating
towards 10.3.6.5
2019-08-13 17:41:43.023 (22276) SSHClient_Pw::authenticate() authentication failure
towards 10.3.6.5
2019-08-13 17:41:43.023 (22276) SSHClient_Pw::authenticate() ssh->lastErrorText():
ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
Password is empty. Choosing keyboard-interactive login instead.
keyboardInteractiveAuth:
Sent keyboard-interactive request
userAuthInfoRequest:
parseUserAuthInfoRequest:
name:
instruction:
language:
numPrompts: 1
prompt:
********************************************************************************
IF YOU ARE NOT AN AUTHORIZED USER, PLEASE EXIT IMMEDIATELY.
********************************************************************************
Password:
echo: 0
--parseUserAuthInfoRequest
Sending password...
sshKeyboardInteractive:
Sent keyboard-interactive response.
userAuthNonSuccess:
partialSuccess: 0
authList: publickey,password,keyboard-interactive
--userAuthNonSuccess
--sshKeyboardInteractive
keyboard-interactive authentication failed (A)
--userAuthInfoRequest
--keyboardInteractiveAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-08-13 17:41:43.024 (22276) SSHClientBase::run() failed to authenticate ssh-


>lastErrorText(): ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
Connected.
--IsConnected
--ChilkatLog

2019-08-13 17:41:43.024 (22276) SSHClientBase::run() - Calling


cleanupTerminalType()
2019-08-13 17:41:43.024 (22276) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-08-13 17:41:43.024 (22276) SSHClientBase::run() - Calling ssh->Disconnect()
2019-08-13 17:41:43.076 (22276) SSHClientBase::run() - Calling ssh->Dispose()
2019-08-13 17:41:43.076 (22276) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-08-13 17:41:43.080 (6052) SshLogFile::~SshLogFile() - Destroying object
2019-08-13 17:45:30.969 (21744) SSHClientBase::run() gAuthentication = 1
2019-08-13 17:45:30.985 (6052) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-08-13 17:45:31.394 (21744) SSHClient_Pw::authenticate() login name: sent
2019-08-13 17:45:31.394 (21744) SSHClient_Pw::authenticate() received login name:
2019-08-13 17:45:31.394 (21744) SSHClientBase::run() failed to authenticate ssh-
>lastErrorText(): ChilkatLog:
Connect_Ssh:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
connectInner:
hostname: 10.3.6.5
port: 22
sshConnect:
Established TCP/IP connection with SSH server
--sshConnect
sshSetupConnection:
clientIdentifier: SSH-2.0-PuTTY_Release_0.66
Sending client identifier...
Done sending client identifier.
Reading server version...
initialDataFromSshServer: SSH-2.0-OpenSSH_6.6.1

serverVersion: SSH-2.0-OpenSSH_6.6.1
KeyExchangeAlgs:
algorithm: curve25519-sha256@libssh.org
algorithm: ecdh-sha2-nistp256
algorithm: ecdh-sha2-nistp384
algorithm: ecdh-sha2-nistp521
algorithm: diffie-hellman-group-exchange-sha256
algorithm: diffie-hellman-group-exchange-sha1
algorithm: diffie-hellman-group14-sha1
algorithm: diffie-hellman-group1-sha1
--KeyExchangeAlgs
HostKeyAlgs:
algorithm: ssh-rsa
algorithm: ssh-dss
algorithm: ecdsa-sha2-nistp256
algorithm: ssh-ed25519
--HostKeyAlgs
EncCS:
algorithm: aes128-ctr
algorithm: aes256-ctr
algorithm: arcfour256
algorithm: arcfour
algorithm: aes128-cbc
algorithm: aes256-cbc
--EncCS
EncSC:
algorithm: aes128-ctr
algorithm: aes256-ctr
algorithm: arcfour256
algorithm: arcfour
algorithm: aes128-cbc
algorithm: aes256-cbc
--EncSC
MacCS:
algorithm: hmac-md5-etm@openssh.com
algorithm: hmac-sha1-etm@openssh.com
algorithm: umac-64-etm@openssh.com
algorithm: umac-128-etm@openssh.com
algorithm: hmac-sha2-256-etm@openssh.com
algorithm: hmac-sha2-512-etm@openssh.com
algorithm: hmac-ripemd160-etm@openssh.com
algorithm: hmac-sha1-96-etm@openssh.com
algorithm: hmac-md5-96-etm@openssh.com
algorithm: hmac-md5
algorithm: hmac-sha1
algorithm: umac-64@openssh.com
algorithm: umac-128@openssh.com
algorithm: hmac-sha2-256
algorithm: hmac-sha2-512
algorithm: hmac-ripemd160
algorithm: hmac-ripemd160@openssh.com
algorithm: hmac-sha1-96
algorithm: hmac-md5-96
--MacCS
MacSC:
algorithm: hmac-md5-etm@openssh.com
algorithm: hmac-sha1-etm@openssh.com
algorithm: umac-64-etm@openssh.com
algorithm: umac-128-etm@openssh.com
algorithm: hmac-sha2-256-etm@openssh.com
algorithm: hmac-sha2-512-etm@openssh.com
algorithm: hmac-ripemd160-etm@openssh.com
algorithm: hmac-sha1-96-etm@openssh.com
algorithm: hmac-md5-96-etm@openssh.com
algorithm: hmac-md5
algorithm: hmac-sha1
algorithm: umac-64@openssh.com
algorithm: umac-128@openssh.com
algorithm: hmac-sha2-256
algorithm: hmac-sha2-512
algorithm: hmac-ripemd160
algorithm: hmac-ripemd160@openssh.com
algorithm: hmac-sha1-96
algorithm: hmac-md5-96
--MacSC
CompCS:
algorithm: none
algorithm: zlib@openssh.com
--CompCS
CompSC:
algorithm: none
algorithm: zlib@openssh.com
--CompSC
ChosenIncomingEncryption: aes256-ctr
ChosenOutgoingEncryptoin: aes256-ctr
ChosenIncomingMac: hmac-sha2-256
ChosenOutgoingMac: hmac-sha2-256
ChosenIncomingCompression: zlib@openssh.com
ChosenOutgoingCompression: zlib@openssh.com
ChosenKexAlgorithm: diffie-hellman-group-exchange-sha256
ChosenHostKeyAlgorithm: ssh-rsa
Received GEX Group.
Using SHA256 for Key Exchange Hash
RSA host key parsed successfully.
Sending newkeys to server...
Expecting newkeys from server...
SSH Key Exchange Success.
installNewKeys:
m_isRekey: 0
Delay compression until after USERAUTH_SUCCESS
No outgoing compression.
No incoming compression.
Outgoing encryption is now AES 256 CTR
outgoingMac: SHA256
--installNewKeys
--sshSetupConnection
socketOptions:
SO_SNDBUF: 262144
SO_RCVBUF: 4194304
TCP_NODELAY: 1
SO_KEEPALIVE: 0
--socketOptions
--connectInner
Success.
--Connect_Ssh
--ChilkatLog

2019-08-13 17:45:31.394 (21744) SSHClientBase::run() - Calling


cleanupTerminalType()
2019-08-13 17:45:31.394 (21744) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-08-13 17:45:31.394 (21744) SSHClientBase::run() - Calling ssh->Disconnect()
2019-08-13 17:45:31.460 (21744) SSHClientBase::run() - Calling ssh->Dispose()
2019-08-13 17:45:31.460 (21744) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-08-13 17:45:31.460 (6052) SshLogFile::~SshLogFile() - Destroying object
2019-08-13 17:45:38.704 (22768) SSHClientBase::run() gAuthentication = 1
2019-08-13 17:45:39.073 (22768) SSHClient_Pw::authenticate() login name: sent
2019-08-13 17:45:39.917 (22768) SSHClient_Pw::authenticate() received login name:
tsadmin
2019-08-13 17:45:39.917 (22768) SSHClient_Pw::authenticate() password prompt sent
2019-08-13 17:45:45.817 (22768) SSHClient_Pw::authenticate() password received
2019-08-13 17:45:45.817 (22768) SSHClient_Pw::authenticate() authenticating towards
10.3.6.5
2019-08-13 17:45:45.817 (22768) SSHClient_Pw::authenticate() username: tsadmin
2019-08-13 17:45:45.817 (22768) SSHClient_Pw::authenticate() length(password): 16
2019-08-13 17:45:51.692 (22768) SSHClient_Pw::authenticate() AuthenticatePw()
failed ssh->lastErrorText(): ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
passwordAuth:
Sent login/password
Authentication failed or partial success. (1)
PartialSuccess1: 0
AuthList: publickey,password,keyboard-interactive
important:
This is likely a simple invalid login and/or password error,
meaning your application did not send the correct login and/or password.
--important
--passwordAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-08-13 17:45:51.692 (22768) SSHClient_Pw::authenticate()


get_PasswordChangeRequested() == false
2019-08-13 17:45:51.692 (22768) SSHClient_Pw::authenticate() is connected,
authentication failure towards 10.3.6.5
ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
Connected.
--IsConnected
--ChilkatLog

2019-08-13 17:45:51.692 (22768) SSHClient_Pw::retryAuthenticate() password prompt


sent
2019-08-13 17:45:58.160 (22768) SSHClient_Pw::retryAuthenticate() password received
2019-08-13 17:45:58.160 (22768) SSHClient_Pw::retryAuthenticate() authenticating
towards 10.3.6.5
2019-08-13 17:46:03.964 (22768) SSHClient_Pw::authenticate() authentication failure
towards 10.3.6.5
2019-08-13 17:46:03.964 (22768) SSHClient_Pw::authenticate() ssh->lastErrorText():
ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
passwordAuth:
Sent login/password
Authentication failed or partial success. (1)
PartialSuccess1: 0
AuthList: publickey,password,keyboard-interactive
important:
This is likely a simple invalid login and/or password error,
meaning your application did not send the correct login and/or password.
--important
--passwordAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-08-13 17:46:03.964 (22768) SSHClient_Pw::retryAuthenticate() password prompt


sent
2019-08-16 16:50:30.977 (25712) SSHClientBase::run() gAuthentication = 0
2019-08-16 16:50:31.396 (25712) SSHClient_Pw::authenticate() login name: sent
2019-08-16 16:50:44.379 (25712) SSHClient_Pw::authenticate() received login name:
tsadmin
2019-08-16 16:50:44.379 (25712) SSHClient_Pw::authenticate() password prompt sent
2019-08-16 16:50:53.319 (25712) SSHClient_Pw::authenticate() password received
2019-08-16 16:50:53.319 (25712) SSHClient_Pw::authenticate() authenticating towards
10.3.22.168
2019-08-16 16:50:53.319 (25712) SSHClient_Pw::authenticate() username: tsadmin
2019-08-16 16:50:53.319 (25712) SSHClient_Pw::authenticate() length(password): 11
2019-08-16 16:50:59.352 (25712) SSHClient_Pw::authenticate() AuthenticatePw()
failed ssh->lastErrorText(): ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
passwordAuth:
Sent login/password
Authentication failed or partial success. (1)
PartialSuccess1: 0
AuthList: publickey,password,keyboard-interactive
important:
This is likely a simple invalid login and/or password error,
meaning your application did not send the correct login and/or password.
--important
--passwordAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-08-16 16:50:59.352 (25712) SSHClient_Pw::authenticate()


get_PasswordChangeRequested() == false
2019-08-16 16:50:59.352 (25712) SSHClient_Pw::authenticate() is connected,
authentication failure towards 10.3.22.168
ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
Connected.
--IsConnected
--ChilkatLog

2019-08-16 16:50:59.352 (25712) SSHClient_Pw::retryAuthenticate() password prompt


sent
2019-08-16 16:51:11.693 (25712) SSHClient_Pw::retryAuthenticate() password received
2019-08-16 16:51:11.693 (25712) SSHClient_Pw::retryAuthenticate() authenticating
towards 10.3.22.168
2019-08-16 16:51:17.510 (25712) SSHClient_Pw::authenticate() authentication failure
towards 10.3.22.168
2019-08-16 16:51:17.510 (25712) SSHClient_Pw::authenticate() ssh->lastErrorText():
ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
passwordAuth:
Sent login/password
Authentication failed or partial success. (1)
PartialSuccess1: 0
AuthList: publickey,password,keyboard-interactive
important:
This is likely a simple invalid login and/or password error,
meaning your application did not send the correct login and/or password.
--important
--passwordAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-08-16 16:51:17.510 (25712) SSHClient_Pw::retryAuthenticate() password prompt


sent
2019-08-16 16:51:35.125 (6052) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-08-16 16:51:35.129 (25712) SSHClient_Pw::retryAuthenticate() password received
2019-08-16 16:51:35.129 (25712) SSHClient_Pw::retryAuthenticate() authenticating
towards 10.3.22.168
2019-08-16 16:51:39.703 (25712) SSHClient_Pw::authenticate() authentication failure
towards 10.3.22.168
2019-08-16 16:51:39.703 (25712) SSHClient_Pw::authenticate() ssh->lastErrorText():
ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
Password is empty. Choosing keyboard-interactive login instead.
keyboardInteractiveAuth:
Sent keyboard-interactive request
userAuthInfoRequest:
parseUserAuthInfoRequest:
name:
instruction:
language:
numPrompts: 1
prompt:
********************************************************************************
WELCOME TO KIHLRFE01, IF YOU ARE NOT AN AUTHORIZED USER, PLEASE EXIT IMMEDIATELY
********************************************************************************
Password:
echo: 0
--parseUserAuthInfoRequest
Sending password...
sshKeyboardInteractive:
Sent keyboard-interactive response.
userAuthNonSuccess:
partialSuccess: 0
authList: publickey,password,keyboard-interactive
--userAuthNonSuccess
--sshKeyboardInteractive
keyboard-interactive authentication failed (A)
--userAuthInfoRequest
--keyboardInteractiveAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-08-16 16:51:39.703 (25712) SSHClientBase::run() failed to authenticate ssh-


>lastErrorText(): ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
Connected.
--IsConnected
--ChilkatLog

2019-08-16 16:51:39.703 (25712) SSHClientBase::run() - Calling


cleanupTerminalType()
2019-08-16 16:51:39.703 (25712) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-08-16 16:51:39.703 (25712) SSHClientBase::run() - Calling ssh->Disconnect()
2019-08-16 16:51:39.709 (25712) SSHClientBase::run() - Calling ssh->Dispose()
2019-08-16 16:51:39.709 (25712) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-08-16 16:51:39.710 (6052) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-08-16 16:51:39.730 (21276) SSHClientBase::run() gAuthentication = 1
2019-08-16 16:51:40.101 (21276) SSHClient_Pw::authenticate() login name: sent
2019-08-16 16:51:42.335 (21276) SSHClient_Pw::authenticate() received login name:
tsadmin
2019-08-16 16:51:42.335 (21276) SSHClient_Pw::authenticate() password prompt sent
2019-08-16 16:51:46.395 (21276) SSHClient_Pw::authenticate() password received
2019-08-16 16:51:46.395 (21276) SSHClient_Pw::authenticate() authenticating towards
10.3.22.168
2019-08-16 16:51:46.395 (21276) SSHClient_Pw::authenticate() username: tsadmin
2019-08-16 16:51:46.395 (21276) SSHClient_Pw::authenticate() length(password): 11
2019-08-16 16:51:50.555 (21276) SSHClient_Pw::authenticate() AuthenticatePw()
failed ssh->lastErrorText(): ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
passwordAuth:
Sent login/password
Authentication failed or partial success. (1)
PartialSuccess1: 0
AuthList: publickey,password,keyboard-interactive
important:
This is likely a simple invalid login and/or password error,
meaning your application did not send the correct login and/or password.
--important
--passwordAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-08-16 16:51:50.555 (21276) SSHClient_Pw::authenticate()


get_PasswordChangeRequested() == false
2019-08-16 16:51:50.555 (21276) SSHClient_Pw::authenticate() is connected,
authentication failure towards 10.3.22.168
ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
Connected.
--IsConnected
--ChilkatLog

2019-08-16 16:51:50.555 (21276) SSHClient_Pw::retryAuthenticate() password prompt


sent
2019-08-16 17:28:09.952 (6052) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-08-16 17:28:09.960 (21276) SSHClient_Pw::retryAuthenticate() password received
2019-08-16 17:28:09.962 (21276) SSHClient_Pw::retryAuthenticate() authenticating
towards 10.3.22.168
2019-08-16 17:28:09.962 (21276) SSHClient_Pw::authenticate() authentication failure
towards 10.3.22.168
2019-08-16 17:28:09.962 (21276) SSHClient_Pw::authenticate() ssh->lastErrorText():
ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
No longer connected to the SSH server.
--AuthenticatePw
--ChilkatLog

2019-08-16 17:28:09.962 (21276) SSHClientBase::run() failed to authenticate ssh-


>lastErrorText(): ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
No longer connected.
--IsConnected
--ChilkatLog

2019-08-16 17:28:09.962 (21276) SSHClientBase::run() - Calling


cleanupTerminalType()
2019-08-16 17:28:09.962 (21276) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-08-16 17:28:09.962 (21276) SSHClientBase::run() - Calling ssh->Disconnect()
2019-08-16 17:28:09.962 (21276) SSHClientBase::run() - Calling ssh->Dispose()
2019-08-16 17:28:09.962 (21276) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-08-16 17:28:09.964 (6052) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-08-16 17:28:09.973 (27788) SSHClientBase::run() gAuthentication = 1
2019-08-16 17:28:10.443 (27788) SSHClient_Pw::authenticate() login name: sent
2019-08-16 17:28:12.169 (27788) SSHClient_Pw::authenticate() received login name:
tsadmin
2019-08-16 17:28:12.169 (27788) SSHClient_Pw::authenticate() password prompt sent
2019-08-16 17:28:16.530 (27788) SSHClient_Pw::authenticate() password received
2019-08-16 17:28:16.530 (27788) SSHClient_Pw::authenticate() authenticating towards
10.3.22.168
2019-08-16 17:28:16.530 (27788) SSHClient_Pw::authenticate() username: tsadmin
2019-08-16 17:28:16.530 (27788) SSHClient_Pw::authenticate() length(password): 11
2019-08-16 17:28:16.926 (27788) SSHClient_Pw::authenticate()
get_PasswordChangeRequested() == false
2019-08-16 17:28:16.926 (27788) SSHClientBase::run() authentication successful
2019-08-16 17:28:16.968 (27788) SSHClientBase::run() ssh->OpenSessionChannel()
success, channelNum=0
2019-08-16 17:28:16.975 (27788) SSHClientBase::run() ssh->get_MaxPacketSize(): 2048
2019-08-16 18:04:15.661 (27788) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 0
2019-08-16 18:04:15.661 (27788) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-08-16 18:04:15.661 (27788) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-08-16 18:04:15.661 (27788) SSHClientBase::run() n == 0, this->username:
tsadmin
2019-08-16 18:04:15.661 (27788) SSHClientBase::run() n == 0, length(newPassword): 0
2019-08-16 18:04:15.661 (27788) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 1
2019-08-16 18:04:15.661 (27788) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-08-16 18:04:15.661 (27788) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-08-16 18:04:15.661 (27788) SSHClientBase::run() n == 0, this->username:
tsadmin
2019-08-16 18:04:15.661 (27788) SSHClientBase::run() n == 0, length(newPassword): 0
2019-08-16 18:04:15.661 (27788) SSHClientBase::run() - ssh->ChannelReadAndPoll2()
returned -1
2019-08-16 18:04:15.661 (27788) - - - - SSHClientBase::run() ssh->lastErrorText():
ChilkatLog:
ChannelPoll:
ChilkatVersion: 9.5.0.61
This channel already received the EOF.
Sent SSH Channel CLOSE
--ChannelPoll
--ChilkatLog

2019-08-16 18:04:15.661 (27788) SSHClientBase::run() channel is [connected/open]:


[1/0]
2019-08-16 18:04:15.661 (27788) SSHClientBase::run() - Calling
cleanupTerminalType()
2019-08-16 18:04:15.661 (27788) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-08-16 18:04:15.661 (27788) SSHClientBase::run() - Calling ssh->Disconnect()
2019-08-16 18:04:15.689 (27788) SSHClientBase::run() - Calling ssh->Dispose()
2019-08-16 18:04:15.689 (27788) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-08-16 18:04:15.690 (17452) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-08-16 18:04:15.690 (17452) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-08-16 18:05:51.975 (10336) SSHClientBase::run() gAuthentication = 1
2019-08-16 18:05:52.361 (10336) SSHClient_Pw::authenticate() login name: sent
2019-08-16 18:05:54.494 (10336) SSHClient_Pw::authenticate() received login name:
tsadmin
2019-08-16 18:05:54.494 (10336) SSHClient_Pw::authenticate() password prompt sent
2019-08-16 18:05:58.912 (10336) SSHClient_Pw::authenticate() password received
2019-08-16 18:05:58.912 (10336) SSHClient_Pw::authenticate() authenticating towards
10.3.22.168
2019-08-16 18:05:58.912 (10336) SSHClient_Pw::authenticate() username: tsadmin
2019-08-16 18:05:58.912 (10336) SSHClient_Pw::authenticate() length(password): 11
2019-08-16 18:05:59.286 (10336) SSHClient_Pw::authenticate()
get_PasswordChangeRequested() == false
2019-08-16 18:05:59.286 (10336) SSHClientBase::run() authentication successful
2019-08-16 18:05:59.296 (10336) SSHClientBase::run() ssh->OpenSessionChannel()
success, channelNum=0
2019-08-16 18:05:59.304 (10336) SSHClientBase::run() ssh->get_MaxPacketSize(): 2048
2019-08-16 18:12:57.473 (20036) SSHClientBase::run() gAuthentication = 1
2019-08-16 18:12:57.936 (20036) SSHClient_Pw::authenticate() login name: sent
2019-08-16 18:13:00.117 (20036) SSHClient_Pw::authenticate() received login name:
tsadmin
2019-08-16 18:13:00.117 (20036) SSHClient_Pw::authenticate() password prompt sent
2019-08-16 18:13:14.838 (20036) SSHClient_Pw::authenticate() password received
2019-08-16 18:13:14.838 (20036) SSHClient_Pw::authenticate() authenticating towards
10.3.16.11
2019-08-16 18:13:14.838 (20036) SSHClient_Pw::authenticate() username: tsadmin
2019-08-16 18:13:14.838 (20036) SSHClient_Pw::authenticate() length(password): 16
2019-08-16 18:13:22.428 (20036) SSHClient_Pw::authenticate() AuthenticatePw()
failed ssh->lastErrorText(): ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
passwordAuth:
Sent login/password
Authentication failed or partial success. (1)
PartialSuccess1: 0
AuthList: publickey,password,keyboard-interactive
important:
This is likely a simple invalid login and/or password error,
meaning your application did not send the correct login and/or password.
--important
--passwordAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-08-16 18:13:22.428 (20036) SSHClient_Pw::authenticate()


get_PasswordChangeRequested() == false
2019-08-16 18:13:22.428 (20036) SSHClient_Pw::authenticate() is connected,
authentication failure towards 10.3.16.11
ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
Connected.
--IsConnected
--ChilkatLog

2019-08-16 18:13:22.428 (20036) SSHClient_Pw::retryAuthenticate() password prompt


sent
2019-08-16 18:13:39.535 (20036) SSHClient_Pw::retryAuthenticate() password received
2019-08-16 18:13:39.535 (20036) SSHClient_Pw::retryAuthenticate() authenticating
towards 10.3.16.11
2019-08-16 18:13:44.466 (20036) SSHClient_Pw::authenticate() authentication failure
towards 10.3.16.11
2019-08-16 18:13:44.466 (20036) SSHClient_Pw::authenticate() ssh->lastErrorText():
ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
passwordAuth:
Sent login/password
Authentication failed or partial success. (1)
PartialSuccess1: 0
AuthList: publickey,password,keyboard-interactive
important:
This is likely a simple invalid login and/or password error,
meaning your application did not send the correct login and/or password.
--important
--passwordAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-08-16 18:13:44.467 (20036) SSHClient_Pw::retryAuthenticate() password prompt


sent
2019-08-16 18:52:43.570 (10336) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 0
2019-08-16 18:52:43.570 (10336) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-08-16 18:52:43.570 (10336) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-08-16 18:52:43.570 (10336) SSHClientBase::run() n == 0, this->username:
tsadmin
2019-08-16 18:52:43.570 (10336) SSHClientBase::run() n == 0, length(newPassword): 0
2019-08-16 18:52:43.570 (10336) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 1
2019-08-16 18:52:43.570 (10336) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-08-16 18:52:43.570 (10336) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-08-16 18:52:43.570 (10336) SSHClientBase::run() n == 0, this->username:
tsadmin
2019-08-16 18:52:43.570 (10336) SSHClientBase::run() n == 0, length(newPassword): 0
2019-08-16 18:52:43.570 (10336) SSHClientBase::run() - ssh->ChannelReadAndPoll2()
returned -1
2019-08-16 18:52:43.570 (10336) - - - - SSHClientBase::run() ssh->lastErrorText():
ChilkatLog:
ChannelPoll:
ChilkatVersion: 9.5.0.61
This channel already received the EOF.
Sent SSH Channel CLOSE
--ChannelPoll
--ChilkatLog

2019-08-16 18:52:43.570 (10336) SSHClientBase::run() channel is [connected/open]:


[1/0]
2019-08-16 18:52:43.570 (10336) SSHClientBase::run() - Calling
cleanupTerminalType()
2019-08-16 18:52:43.570 (10336) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-08-16 18:52:43.570 (10336) SSHClientBase::run() - Calling ssh->Disconnect()
2019-08-16 18:52:43.582 (10336) SSHClientBase::run() - Calling ssh->Dispose()
2019-08-16 18:52:43.582 (10336) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-08-16 18:52:43.582 (15488) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-08-16 18:52:43.582 (15488) SshLogFile::~SshLogFile() - there are 2 remaining
users
2019-08-19 17:59:21.779 (6052) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-08-19 17:59:21.817 (22768) SSHClient_Pw::retryAuthenticate() password received
2019-08-19 17:59:21.847 (22768) SSHClient_Pw::retryAuthenticate() authenticating
towards 10.3.6.5
2019-08-19 17:59:21.847 (22768) SSHClient_Pw::authenticate() authentication failure
towards 10.3.6.5
2019-08-19 17:59:21.876 (22768) SSHClient_Pw::authenticate() ssh->lastErrorText():
ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
No longer connected to the SSH server.
--AuthenticatePw
--ChilkatLog

2019-08-19 17:59:21.898 (22768) SSHClientBase::run() failed to authenticate ssh-


>lastErrorText(): ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
No longer connected.
--IsConnected
--ChilkatLog

2019-08-19 17:59:21.898 (22768) SSHClientBase::run() - Calling


cleanupTerminalType()
2019-08-19 17:59:21.898 (22768) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-08-19 17:59:21.898 (22768) SSHClientBase::run() - Calling ssh->Disconnect()
2019-08-19 17:59:21.898 (22768) SSHClientBase::run() - Calling ssh->Dispose()
2019-08-19 17:59:21.898 (22768) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-08-19 17:59:21.911 (6052) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-08-19 17:59:25.387 (6052) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-08-19 17:59:25.426 (20036) SSHClient_Pw::retryAuthenticate() password received
2019-08-19 17:59:25.428 (20036) SSHClient_Pw::retryAuthenticate() authenticating
towards 10.3.16.11
2019-08-19 17:59:25.428 (20036) SSHClient_Pw::authenticate() authentication failure
towards 10.3.16.11
2019-08-19 17:59:25.428 (20036) SSHClient_Pw::authenticate() ssh->lastErrorText():
ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
No longer connected to the SSH server.
--AuthenticatePw
--ChilkatLog

2019-08-19 17:59:25.428 (20036) SSHClientBase::run() failed to authenticate ssh-


>lastErrorText(): ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
No longer connected.
--IsConnected
--ChilkatLog

2019-08-19 17:59:25.428 (20036) SSHClientBase::run() - Calling


cleanupTerminalType()
2019-08-19 17:59:25.428 (20036) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-08-19 17:59:25.428 (20036) SSHClientBase::run() - Calling ssh->Disconnect()
2019-08-19 17:59:25.445 (20036) SSHClientBase::run() - Calling ssh->Dispose()
2019-08-19 17:59:25.445 (20036) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-08-19 17:59:25.446 (6052) SshLogFile::~SshLogFile() - Destroying object
2019-08-21 11:46:57.150 (21204) SSHClientBase::run() gAuthentication = 1
2019-08-21 11:46:57.752 (21204) SSHClient_Pw::authenticate() login name: sent
2019-08-28 15:18:05.507 (2128) SSHClientBase::run() gAuthentication = 1
2019-08-28 15:18:09.110 (2128) SSHClient_Pw::authenticate() login name: sent
2019-08-28 15:18:16.625 (2128) SSHClient_Pw::authenticate() received login name:
tsadmin
2019-08-28 15:18:16.625 (2128) SSHClient_Pw::authenticate() password prompt sent
2019-08-28 15:18:22.261 (2128) SSHClient_Pw::authenticate() password received
2019-08-28 15:18:22.261 (2128) SSHClient_Pw::authenticate() authenticating towards
10.3.16.11
2019-08-28 15:18:22.261 (2128) SSHClient_Pw::authenticate() username: tsadmin
2019-08-28 15:18:22.261 (2128) SSHClient_Pw::authenticate() length(password): 16
2019-08-28 15:18:26.795 (2128) SSHClient_Pw::authenticate() AuthenticatePw() failed
ssh->lastErrorText(): ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
passwordAuth:
Sent login/password
Authentication failed or partial success. (1)
PartialSuccess1: 0
AuthList: publickey,password,keyboard-interactive
important:
This is likely a simple invalid login and/or password error,
meaning your application did not send the correct login and/or password.
--important
--passwordAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-08-28 15:18:26.795 (2128) SSHClient_Pw::authenticate()


get_PasswordChangeRequested() == false
2019-08-28 15:18:26.795 (2128) SSHClient_Pw::authenticate() is connected,
authentication failure towards 10.3.16.11
ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
Connected.
--IsConnected
--ChilkatLog

2019-08-28 15:18:26.795 (2128) SSHClient_Pw::retryAuthenticate() password prompt


sent
2019-08-28 15:24:47.186 (16640) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-08-28 15:24:47.199 (2128) SSHClient_Pw::retryAuthenticate() password received
2019-08-28 15:24:47.201 (2128) SSHClient_Pw::retryAuthenticate() authenticating
towards 10.3.16.11
2019-08-28 15:24:47.201 (2128) SSHClient_Pw::authenticate() authentication failure
towards 10.3.16.11
2019-08-28 15:24:47.201 (2128) SSHClient_Pw::authenticate() ssh->lastErrorText():
ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
No longer connected to the SSH server.
--AuthenticatePw
--ChilkatLog

2019-08-28 15:24:47.201 (2128) SSHClientBase::run() failed to authenticate ssh-


>lastErrorText(): ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
No longer connected.
--IsConnected
--ChilkatLog

2019-08-28 15:24:47.243 (2128) SSHClientBase::run() - Calling cleanupTerminalType()


2019-08-28 15:24:47.243 (2128) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-08-28 15:24:47.243 (2128) SSHClientBase::run() - Calling ssh->Disconnect()
2019-08-28 15:24:47.243 (2128) SSHClientBase::run() - Calling ssh->Dispose()
2019-08-28 15:24:47.272 (2128) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-08-28 15:24:47.272 (16640) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-08-28 15:24:47.288 (29964) SSHClientBase::run() gAuthentication = 1
2019-08-28 15:24:47.711 (29964) SSHClient_Pw::authenticate() login name: sent
2019-08-28 15:24:50.148 (29964) SSHClient_Pw::authenticate() received login name:
tsadmin
2019-08-28 15:24:50.148 (29964) SSHClient_Pw::authenticate() password prompt sent
2019-08-28 15:24:57.048 (29964) SSHClient_Pw::authenticate() password received
2019-08-28 15:24:57.048 (29964) SSHClient_Pw::authenticate() authenticating towards
10.3.16.11
2019-08-28 15:24:57.048 (29964) SSHClient_Pw::authenticate() username: tsadmin
2019-08-28 15:24:57.048 (29964) SSHClient_Pw::authenticate() length(password): 16
2019-08-28 15:25:02.843 (29964) SSHClient_Pw::authenticate() AuthenticatePw()
failed ssh->lastErrorText(): ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
passwordAuth:
Sent login/password
Authentication failed or partial success. (1)
PartialSuccess1: 0
AuthList: publickey,password,keyboard-interactive
important:
This is likely a simple invalid login and/or password error,
meaning your application did not send the correct login and/or password.
--important
--passwordAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-08-28 15:25:02.843 (29964) SSHClient_Pw::authenticate()


get_PasswordChangeRequested() == false
2019-08-28 15:25:02.843 (29964) SSHClient_Pw::authenticate() is connected,
authentication failure towards 10.3.16.11
ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
Connected.
--IsConnected
--ChilkatLog

2019-08-28 15:25:02.843 (29964) SSHClient_Pw::retryAuthenticate() password prompt


sent
2019-08-28 15:25:15.084 (16640) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-08-28 15:25:15.121 (29964) SSHClient_Pw::retryAuthenticate() password received
2019-08-28 15:25:15.121 (29964) SSHClient_Pw::retryAuthenticate() authenticating
towards 10.3.16.11
2019-08-28 15:25:21.883 (29964) SSHClient_Pw::authenticate() authentication failure
towards 10.3.16.11
2019-08-28 15:25:21.883 (29964) SSHClient_Pw::authenticate() ssh->lastErrorText():
ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
Password is empty. Choosing keyboard-interactive login instead.
keyboardInteractiveAuth:
Sent keyboard-interactive request
userAuthInfoRequest:
parseUserAuthInfoRequest:
name:
instruction:
language:
numPrompts: 1
prompt:
********************************************************************************
IF YOU ARE NOT AN AUTHORIZED USER, PLEASE EXIT IMMEDIATELY.
********************************************************************************
Password:
echo: 0
--parseUserAuthInfoRequest
Sending password...
sshKeyboardInteractive:
Sent keyboard-interactive response.
parseUserAuthInfoRequest:
name:
instruction: Account locked due to 8 failed logins

language:
numPrompts: 0
--parseUserAuthInfoRequest
--sshKeyboardInteractive
sshKeyboardInteractive:
Sent keyboard-interactive response.
userAuthNonSuccess:
partialSuccess: 0
authList: publickey,password,keyboard-interactive
--userAuthNonSuccess
--sshKeyboardInteractive
keyboard-interactive authentication failed (A)
--userAuthInfoRequest
--keyboardInteractiveAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-08-28 15:25:21.883 (29964) SSHClientBase::run() failed to authenticate ssh-


>lastErrorText(): ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
Connected.
--IsConnected
--ChilkatLog

2019-08-28 15:25:21.883 (29964) SSHClientBase::run() - Calling


cleanupTerminalType()
2019-08-28 15:25:21.883 (29964) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-08-28 15:25:21.883 (29964) SSHClientBase::run() - Calling ssh->Disconnect()
2019-08-28 15:25:21.895 (29964) SSHClientBase::run() - Calling ssh->Dispose()
2019-08-28 15:25:21.895 (29964) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-08-28 15:25:21.895 (16640) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-08-28 15:25:21.899 (23144) SSHClientBase::run() gAuthentication = 1
2019-08-28 15:25:22.327 (23144) SSHClient_Pw::authenticate() login name: sent
2019-08-28 15:25:24.561 (23144) SSHClient_Pw::authenticate() received login name:
tsadmin
2019-08-28 15:25:24.561 (23144) SSHClient_Pw::authenticate() password prompt sent
2019-08-28 16:04:56.375 (16640) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-08-28 16:04:56.382 (23144) SSHClient_Pw::authenticate() password received
2019-08-28 16:04:56.382 (23144) SSHClientBase::run() failed to authenticate ssh-
>lastErrorText(): ChilkatLog:
Connect_Ssh:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
connectInner:
hostname: 10.3.16.9
port: 4422
sshConnect:
Established TCP/IP connection with SSH server
--sshConnect
sshSetupConnection:
clientIdentifier: SSH-2.0-PuTTY_Release_0.66
Sending client identifier...
Done sending client identifier.
Reading server version...
initialDataFromSshServer: SSH-2.0-OpenSSH_6.6.1

serverVersion: SSH-2.0-OpenSSH_6.6.1
KeyExchangeAlgs:
algorithm: curve25519-sha256@libssh.org
algorithm: ecdh-sha2-nistp256
algorithm: ecdh-sha2-nistp384
algorithm: ecdh-sha2-nistp521
algorithm: diffie-hellman-group-exchange-sha256
algorithm: diffie-hellman-group-exchange-sha1
algorithm: diffie-hellman-group14-sha1
algorithm: diffie-hellman-group1-sha1
--KeyExchangeAlgs
HostKeyAlgs:
algorithm: ssh-rsa
algorithm: ssh-dss
algorithm: ecdsa-sha2-nistp256
algorithm: ssh-ed25519
--HostKeyAlgs
EncCS:
algorithm: aes128-ctr
algorithm: aes256-ctr
algorithm: arcfour256
algorithm: arcfour
algorithm: aes128-cbc
algorithm: aes256-cbc
--EncCS
EncSC:
algorithm: aes128-ctr
algorithm: aes256-ctr
algorithm: arcfour256
algorithm: arcfour
algorithm: aes128-cbc
algorithm: aes256-cbc
--EncSC
MacCS:
algorithm: hmac-md5-etm@openssh.com
algorithm: hmac-sha1-etm@openssh.com
algorithm: umac-64-etm@openssh.com
algorithm: umac-128-etm@openssh.com
algorithm: hmac-sha2-256-etm@openssh.com
algorithm: hmac-sha2-512-etm@openssh.com
algorithm: hmac-ripemd160-etm@openssh.com
algorithm: hmac-sha1-96-etm@openssh.com
algorithm: hmac-md5-96-etm@openssh.com
algorithm: hmac-md5
algorithm: hmac-sha1
algorithm: umac-64@openssh.com
algorithm: umac-128@openssh.com
algorithm: hmac-sha2-256
algorithm: hmac-sha2-512
algorithm: hmac-ripemd160
algorithm: hmac-ripemd160@openssh.com
algorithm: hmac-sha1-96
algorithm: hmac-md5-96
--MacCS
MacSC:
algorithm: hmac-md5-etm@openssh.com
algorithm: hmac-sha1-etm@openssh.com
algorithm: umac-64-etm@openssh.com
algorithm: umac-128-etm@openssh.com
algorithm: hmac-sha2-256-etm@openssh.com
algorithm: hmac-sha2-512-etm@openssh.com
algorithm: hmac-ripemd160-etm@openssh.com
algorithm: hmac-sha1-96-etm@openssh.com
algorithm: hmac-md5-96-etm@openssh.com
algorithm: hmac-md5
algorithm: hmac-sha1
algorithm: umac-64@openssh.com
algorithm: umac-128@openssh.com
algorithm: hmac-sha2-256
algorithm: hmac-sha2-512
algorithm: hmac-ripemd160
algorithm: hmac-ripemd160@openssh.com
algorithm: hmac-sha1-96
algorithm: hmac-md5-96
--MacSC
CompCS:
algorithm: none
algorithm: zlib@openssh.com
--CompCS
CompSC:
algorithm: none
algorithm: zlib@openssh.com
--CompSC
ChosenIncomingEncryption: aes256-ctr
ChosenOutgoingEncryptoin: aes256-ctr
ChosenIncomingMac: hmac-sha2-256
ChosenOutgoingMac: hmac-sha2-256
ChosenIncomingCompression: zlib@openssh.com
ChosenOutgoingCompression: zlib@openssh.com
ChosenKexAlgorithm: diffie-hellman-group-exchange-sha256
ChosenHostKeyAlgorithm: ssh-rsa
Received GEX Group.
Using SHA256 for Key Exchange Hash
RSA host key parsed successfully.
Sending newkeys to server...
Expecting newkeys from server...
SSH Key Exchange Success.
installNewKeys:
m_isRekey: 0
Delay compression until after USERAUTH_SUCCESS
No outgoing compression.
No incoming compression.
Outgoing encryption is now AES 256 CTR
outgoingMac: SHA256
--installNewKeys
--sshSetupConnection
socketOptions:
SO_SNDBUF: 262144
SO_RCVBUF: 4194304
TCP_NODELAY: 1
SO_KEEPALIVE: 0
--socketOptions
--connectInner
Success.
--Connect_Ssh
--ChilkatLog

2019-08-28 16:04:56.382 (23144) SSHClientBase::run() - Calling


cleanupTerminalType()
2019-08-28 16:04:56.382 (23144) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-08-28 16:04:56.384 (23144) SSHClientBase::run() - Calling ssh->Disconnect()
2019-08-28 16:04:56.384 (23144) SSHClientBase::run() - Calling ssh->Dispose()
2019-08-28 16:04:56.384 (23144) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-08-28 16:04:56.385 (16640) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-08-28 16:05:00.259 (28084) SSHClientBase::run() gAuthentication = 1
2019-08-28 16:05:00.850 (28084) SSHClient_Pw::authenticate() login name: sent
2019-08-28 16:05:04.203 (28084) SSHClient_Pw::authenticate() received login name:
ossuser
2019-08-28 16:05:04.203 (28084) SSHClient_Pw::authenticate() password prompt sent
2019-08-28 16:05:13.034 (28084) SSHClient_Pw::authenticate() password received
2019-08-28 16:05:13.034 (28084) SSHClient_Pw::authenticate() authenticating towards
10.3.16.9
2019-08-28 16:05:13.034 (28084) SSHClient_Pw::authenticate() username: ossuser
2019-08-28 16:05:13.034 (28084) SSHClient_Pw::authenticate() length(password): 7
2019-08-28 16:05:17.523 (28084) SSHClient_Pw::authenticate() AuthenticatePw()
failed ssh->lastErrorText(): ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
passwordAuth:
Sent login/password
Authentication failed or partial success. (1)
PartialSuccess1: 0
AuthList: publickey,password,keyboard-interactive
important:
This is likely a simple invalid login and/or password error,
meaning your application did not send the correct login and/or password.
--important
--passwordAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-08-28 16:05:17.523 (28084) SSHClient_Pw::authenticate()


get_PasswordChangeRequested() == false
2019-08-28 16:05:17.523 (28084) SSHClient_Pw::authenticate() is connected,
authentication failure towards 10.3.16.9
ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
Connected.
--IsConnected
--ChilkatLog

2019-08-28 16:05:17.523 (28084) SSHClient_Pw::retryAuthenticate() password prompt


sent
2019-08-28 16:06:10.919 (16640) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-08-28 16:06:10.932 (21204) SSHClient_Pw::authenticate() received login name:
2019-08-28 16:06:10.943 (21204) SSHClientBase::run() failed to authenticate ssh-
>lastErrorText(): ChilkatLog:
Connect_Ssh:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
connectInner:
hostname: 10.3.22.168
port: 4422
sshConnect:
Established TCP/IP connection with SSH server
--sshConnect
sshSetupConnection:
clientIdentifier: SSH-2.0-PuTTY_Release_0.66
Sending client identifier...
Done sending client identifier.
Reading server version...
initialDataFromSshServer: SSH-2.0-OpenSSH_6.6.1

serverVersion: SSH-2.0-OpenSSH_6.6.1
KeyExchangeAlgs:
algorithm: curve25519-sha256@libssh.org
algorithm: ecdh-sha2-nistp256
algorithm: ecdh-sha2-nistp384
algorithm: ecdh-sha2-nistp521
algorithm: diffie-hellman-group-exchange-sha256
algorithm: diffie-hellman-group-exchange-sha1
algorithm: diffie-hellman-group14-sha1
algorithm: diffie-hellman-group1-sha1
--KeyExchangeAlgs
HostKeyAlgs:
algorithm: ssh-rsa
algorithm: ssh-dss
algorithm: ecdsa-sha2-nistp256
algorithm: ssh-ed25519
--HostKeyAlgs
EncCS:
algorithm: aes128-ctr
algorithm: aes256-ctr
algorithm: arcfour256
algorithm: arcfour
algorithm: aes128-cbc
algorithm: aes256-cbc
--EncCS
EncSC:
algorithm: aes128-ctr
algorithm: aes256-ctr
algorithm: arcfour256
algorithm: arcfour
algorithm: aes128-cbc
algorithm: aes256-cbc
--EncSC
MacCS:
algorithm: hmac-md5-etm@openssh.com
algorithm: hmac-sha1-etm@openssh.com
algorithm: umac-64-etm@openssh.com
algorithm: umac-128-etm@openssh.com
algorithm: hmac-sha2-256-etm@openssh.com
algorithm: hmac-sha2-512-etm@openssh.com
algorithm: hmac-ripemd160-etm@openssh.com
algorithm: hmac-sha1-96-etm@openssh.com
algorithm: hmac-md5-96-etm@openssh.com
algorithm: hmac-md5
algorithm: hmac-sha1
algorithm: umac-64@openssh.com
algorithm: umac-128@openssh.com
algorithm: hmac-sha2-256
algorithm: hmac-sha2-512
algorithm: hmac-ripemd160
algorithm: hmac-ripemd160@openssh.com
algorithm: hmac-sha1-96
algorithm: hmac-md5-96
--MacCS
MacSC:
algorithm: hmac-md5-etm@openssh.com
algorithm: hmac-sha1-etm@openssh.com
algorithm: umac-64-etm@openssh.com
algorithm: umac-128-etm@openssh.com
algorithm: hmac-sha2-256-etm@openssh.com
algorithm: hmac-sha2-512-etm@openssh.com
algorithm: hmac-ripemd160-etm@openssh.com
algorithm: hmac-sha1-96-etm@openssh.com
algorithm: hmac-md5-96-etm@openssh.com
algorithm: hmac-md5
algorithm: hmac-sha1
algorithm: umac-64@openssh.com
algorithm: umac-128@openssh.com
algorithm: hmac-sha2-256
algorithm: hmac-sha2-512
algorithm: hmac-ripemd160
algorithm: hmac-ripemd160@openssh.com
algorithm: hmac-sha1-96
algorithm: hmac-md5-96
--MacSC
CompCS:
algorithm: none
algorithm: zlib@openssh.com
--CompCS
CompSC:
algorithm: none
algorithm: zlib@openssh.com
--CompSC
ChosenIncomingEncryption: aes256-ctr
ChosenOutgoingEncryptoin: aes256-ctr
ChosenIncomingMac: hmac-sha2-256
ChosenOutgoingMac: hmac-sha2-256
ChosenIncomingCompression: zlib@openssh.com
ChosenOutgoingCompression: zlib@openssh.com
ChosenKexAlgorithm: diffie-hellman-group-exchange-sha256
ChosenHostKeyAlgorithm: ssh-rsa
Received GEX Group.
Using SHA256 for Key Exchange Hash
RSA host key parsed successfully.
Sending newkeys to server...
Expecting newkeys from server...
SSH Key Exchange Success.
installNewKeys:
m_isRekey: 0
Delay compression until after USERAUTH_SUCCESS
No outgoing compression.
No incoming compression.
Outgoing encryption is now AES 256 CTR
outgoingMac: SHA256
--installNewKeys
--sshSetupConnection
socketOptions:
SO_SNDBUF: 262144
SO_RCVBUF: 4194304
TCP_NODELAY: 1
SO_KEEPALIVE: 0
--socketOptions
--connectInner
Success.
--Connect_Ssh
--ChilkatLog

2019-08-28 16:06:10.943 (21204) SSHClientBase::run() - Calling


cleanupTerminalType()
2019-08-28 16:06:10.943 (21204) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-08-28 16:06:10.946 (21204) SSHClientBase::run() - Calling ssh->Disconnect()
2019-08-28 16:06:10.946 (21204) SSHClientBase::run() - Calling ssh->Dispose()
2019-08-28 16:06:10.946 (21204) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-08-28 16:06:10.947 (16640) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-08-28 16:26:50.037 (28084) SSHClient_Pw::retryAuthenticate() password received
2019-08-28 16:26:50.039 (28084) SSHClient_Pw::retryAuthenticate() authenticating
towards 10.3.16.9
2019-08-28 16:26:50.039 (28084) SSHClient_Pw::authenticate() authentication failure
towards 10.3.16.9
2019-08-28 16:26:50.039 (28084) SSHClient_Pw::authenticate() ssh->lastErrorText():
ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
No longer connected to the SSH server.
--AuthenticatePw
--ChilkatLog

2019-08-28 16:26:50.039 (28084) SSHClient_Pw::authenticate() client is not


connected to the ssh server
2019-08-28 16:26:50.039 (28084) SSHClientBase::run() failed to authenticate ssh-
>lastErrorText(): ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
No longer connected.
--IsConnected
--ChilkatLog

2019-08-28 16:26:50.039 (28084) SSHClientBase::run() - Calling


cleanupTerminalType()
2019-08-28 16:26:50.039 (28084) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-08-28 16:26:50.039 (28084) SSHClientBase::run() - Calling ssh->Disconnect()
2019-08-28 16:26:50.039 (28084) SSHClientBase::run() - Calling ssh->Dispose()
2019-08-28 16:26:50.039 (28084) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-08-28 16:26:50.039 (2760) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-08-28 16:26:50.039 (2760) SshLogFile::~SshLogFile() - Destroying object
2019-08-28 16:26:52.982 (2960) SSHClientBase::run() gAuthentication = 1
2019-08-28 16:26:53.434 (2960) SSHClient_Pw::authenticate() login name: sent
2019-08-28 16:26:57.393 (2960) SSHClient_Pw::authenticate() received login name:
ts_pekal
2019-08-28 16:26:57.393 (2960) SSHClient_Pw::authenticate() password prompt sent
2019-08-28 16:27:01.250 (2960) SSHClient_Pw::authenticate() password received
2019-08-28 16:27:01.250 (2960) SSHClient_Pw::authenticate() authenticating towards
10.3.16.9
2019-08-28 16:27:01.250 (2960) SSHClient_Pw::authenticate() username: ts_pekal
2019-08-28 16:27:01.250 (2960) SSHClient_Pw::authenticate() length(password): 8
2019-08-28 16:27:01.623 (2960) SSHClient_Pw::authenticate()
get_PasswordChangeRequested() == false
2019-08-28 16:27:01.623 (2960) SSHClientBase::run() authentication successful
2019-08-28 16:27:01.642 (2960) SSHClientBase::run() ssh->OpenSessionChannel()
success, channelNum=0
2019-08-28 16:27:01.652 (2960) SSHClientBase::run() ssh->get_MaxPacketSize(): 2048
2019-08-28 16:36:05.262 (16640) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-08-28 16:36:05.263 (2960) SSHClientBase::run() - thread stop has been
requested
2019-08-28 16:36:05.263 (2960) SSHClientBase::run() - Calling cleanupTerminalType()
2019-08-28 16:36:05.263 (2960) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-08-28 16:36:05.263 (2960) SSHClientBase::run() - Calling ssh->Disconnect()
2019-08-28 16:36:05.338 (2960) SSHClientBase::run() - Calling ssh->Dispose()
2019-08-28 16:36:05.338 (2960) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-08-28 16:36:05.338 (16640) SshLogFile::~SshLogFile() - Destroying object
2019-08-28 16:36:07.125 (29476) SSHClientBase::run() gAuthentication = 1
2019-08-28 16:36:07.557 (29476) SSHClient_Pw::authenticate() login name: sent
2019-08-28 16:36:09.589 (29476) SSHClient_Pw::authenticate() received login name:
ts_pekal
2019-08-28 16:36:09.589 (29476) SSHClient_Pw::authenticate() password prompt sent
2019-08-28 16:36:12.534 (29476) SSHClient_Pw::authenticate() password received
2019-08-28 16:36:12.534 (29476) SSHClient_Pw::authenticate() authenticating towards
10.3.16.9
2019-08-28 16:36:12.534 (29476) SSHClient_Pw::authenticate() username: ts_pekal
2019-08-28 16:36:12.534 (29476) SSHClient_Pw::authenticate() length(password): 8
2019-08-28 16:36:12.673 (29476) SSHClient_Pw::authenticate()
get_PasswordChangeRequested() == false
2019-08-28 16:36:12.673 (29476) SSHClientBase::run() authentication successful
2019-08-28 16:36:12.691 (29476) SSHClientBase::run() ssh->OpenSessionChannel()
success, channelNum=0
2019-08-28 16:36:12.722 (29476) SSHClientBase::run() ssh->get_MaxPacketSize(): 2048
2019-08-28 18:38:42.730 (29476) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 0
2019-08-28 18:38:42.752 (29476) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-08-28 18:38:42.752 (29476) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-08-28 18:38:42.752 (29476) SSHClientBase::run() n == 0, this->username:
ts_pekal
2019-08-28 18:38:42.752 (29476) SSHClientBase::run() n == 0, length(newPassword): 0
2019-08-28 18:38:42.752 (29476) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 1
2019-08-28 18:38:42.752 (29476) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-08-28 18:38:42.752 (29476) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-08-28 18:38:42.752 (29476) SSHClientBase::run() n == 0, this->username:
ts_pekal
2019-08-28 18:38:42.752 (29476) SSHClientBase::run() n == 0, length(newPassword): 0
2019-08-28 18:38:42.754 (29476) SSHClientBase::run() - ssh->ChannelReadAndPoll2()
returned -1
2019-08-28 18:38:42.786 (29476) - - - - SSHClientBase::run() ssh->lastErrorText():
ChilkatLog:
ChannelPoll:
ChilkatVersion: 9.5.0.61
This channel already received the EOF.
Sent SSH Channel CLOSE
--ChannelPoll
--ChilkatLog

2019-08-28 18:38:42.786 (29476) SSHClientBase::run() channel is [connected/open]:


[1/0]
2019-08-28 18:38:42.786 (29476) SSHClientBase::run() - Calling
cleanupTerminalType()
2019-08-28 18:38:42.786 (29476) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-08-28 18:38:42.786 (29476) SSHClientBase::run() - Calling ssh->Disconnect()
2019-08-28 18:38:42.905 (29476) SSHClientBase::run() - Calling ssh->Dispose()
2019-08-28 18:38:42.905 (29476) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-08-28 18:38:42.964 (21160) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-08-28 18:38:42.964 (21160) SshLogFile::~SshLogFile() - Destroying object
2019-08-29 15:58:19.877 (30292) SSHClientBase::run() gAuthentication = 1
2019-08-29 15:58:20.722 (30292) SSHClient_Pw::authenticate() login name: sent
2019-08-29 15:58:22.859 (30292) SSHClient_Pw::authenticate() received login name:
pekal
2019-08-29 15:58:22.859 (30292) SSHClient_Pw::authenticate() password prompt sent
2019-08-29 15:58:27.433 (30292) SSHClient_Pw::authenticate() password received
2019-08-29 15:58:27.433 (30292) SSHClient_Pw::authenticate() authenticating towards
10.3.16.9
2019-08-29 15:58:27.433 (30292) SSHClient_Pw::authenticate() username: pekal
2019-08-29 15:58:27.433 (30292) SSHClient_Pw::authenticate() length(password): 8
2019-08-29 15:58:30.887 (30292) SSHClient_Pw::authenticate() AuthenticatePw()
failed ssh->lastErrorText(): ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
passwordAuth:
Sent login/password
Authentication failed or partial success. (1)
PartialSuccess1: 0
AuthList: publickey,password,keyboard-interactive
important:
This is likely a simple invalid login and/or password error,
meaning your application did not send the correct login and/or password.
--important
--passwordAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-08-29 15:58:30.887 (30292) SSHClient_Pw::authenticate()


get_PasswordChangeRequested() == false
2019-08-29 15:58:30.887 (30292) SSHClient_Pw::authenticate() is connected,
authentication failure towards 10.3.16.9
ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
Connected.
--IsConnected
--ChilkatLog

2019-08-29 15:58:30.887 (30292) SSHClient_Pw::retryAuthenticate() password prompt


sent
2019-08-29 15:58:36.479 (30292) SSHClient_Pw::retryAuthenticate() password received
2019-08-29 15:58:36.479 (30292) SSHClient_Pw::retryAuthenticate() authenticating
towards 10.3.16.9
2019-08-29 15:58:41.347 (30292) SSHClient_Pw::authenticate() authentication failure
towards 10.3.16.9
2019-08-29 15:58:41.347 (30292) SSHClient_Pw::authenticate() ssh->lastErrorText():
ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
passwordAuth:
Sent login/password
Authentication failed or partial success. (1)
PartialSuccess1: 0
AuthList: publickey,password,keyboard-interactive
important:
This is likely a simple invalid login and/or password error,
meaning your application did not send the correct login and/or password.
--important
--passwordAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-08-29 15:58:41.347 (30292) SSHClient_Pw::retryAuthenticate() password prompt


sent
2019-08-29 15:59:36.215 (16640) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-08-29 15:59:36.256 (30292) SSHClient_Pw::retryAuthenticate() password received
2019-08-29 15:59:36.276 (30292) SSHClient_Pw::retryAuthenticate() authenticating
towards 10.3.16.9
2019-08-29 15:59:41.772 (30292) SSHClient_Pw::authenticate() authentication failure
towards 10.3.16.9
2019-08-29 15:59:41.772 (30292) SSHClient_Pw::authenticate() ssh->lastErrorText():
ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
Password is empty. Choosing keyboard-interactive login instead.
keyboardInteractiveAuth:
Sent keyboard-interactive request
userAuthInfoRequest:
parseUserAuthInfoRequest:
name:
instruction:
language:
numPrompts: 1
prompt:
********************************************************************************
IF YOU ARE NOT AN AUTHORIZED USER, PLEASE EXIT IMMEDIATELY.
********************************************************************************
Password:
echo: 0
--parseUserAuthInfoRequest
Sending password...
sshKeyboardInteractive:
Sent keyboard-interactive response.
userAuthNonSuccess:
partialSuccess: 0
authList: publickey,password,keyboard-interactive
--userAuthNonSuccess
--sshKeyboardInteractive
keyboard-interactive authentication failed (A)
--userAuthInfoRequest
--keyboardInteractiveAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-08-29 15:59:41.772 (30292) SSHClientBase::run() failed to authenticate ssh-


>lastErrorText(): ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
Connected.
--IsConnected
--ChilkatLog

2019-08-29 15:59:41.772 (30292) SSHClientBase::run() - Calling


cleanupTerminalType()
2019-08-29 15:59:41.772 (30292) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-08-29 15:59:41.772 (30292) SSHClientBase::run() - Calling ssh->Disconnect()
2019-08-29 15:59:41.783 (30292) SSHClientBase::run() - Calling ssh->Dispose()
2019-08-29 15:59:41.783 (30292) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-08-29 15:59:41.783 (16640) SshLogFile::~SshLogFile() - Destroying object
2019-08-29 15:59:43.662 (22536) SSHClientBase::run() gAuthentication = 1
2019-08-29 15:59:44.443 (22536) SSHClient_Pw::authenticate() login name: sent
2019-08-29 15:59:46.936 (22536) SSHClient_Pw::authenticate() received login name:
ts_pekal
2019-08-29 15:59:46.936 (22536) SSHClient_Pw::authenticate() password prompt sent
2019-08-29 15:59:49.884 (22536) SSHClient_Pw::authenticate() password received
2019-08-29 15:59:49.884 (22536) SSHClient_Pw::authenticate() authenticating towards
10.3.16.9
2019-08-29 15:59:49.884 (22536) SSHClient_Pw::authenticate() username: ts_pekal
2019-08-29 15:59:49.884 (22536) SSHClient_Pw::authenticate() length(password): 8
2019-08-29 15:59:50.052 (22536) SSHClient_Pw::authenticate()
get_PasswordChangeRequested() == false
2019-08-29 15:59:50.052 (22536) SSHClientBase::run() authentication successful
2019-08-29 15:59:50.089 (22536) SSHClientBase::run() ssh->OpenSessionChannel()
success, channelNum=0
2019-08-29 15:59:50.120 (22536) SSHClientBase::run() ssh->get_MaxPacketSize(): 2048
2019-08-29 17:07:11.551 (22536) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 0
2019-08-29 17:07:11.551 (22536) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-08-29 17:07:11.551 (22536) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-08-29 17:07:11.551 (22536) SSHClientBase::run() n == 0, this->username:
ts_pekal
2019-08-29 17:07:11.551 (22536) SSHClientBase::run() n == 0, length(newPassword): 0
2019-08-29 17:07:11.551 (22536) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 1
2019-08-29 17:07:11.551 (22536) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-08-29 17:07:11.551 (22536) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-08-29 17:07:11.551 (22536) SSHClientBase::run() n == 0, this->username:
ts_pekal
2019-08-29 17:07:11.551 (22536) SSHClientBase::run() n == 0, length(newPassword): 0
2019-08-29 17:07:11.561 (22536) SSHClientBase::run() - ssh->ChannelReadAndPoll2()
returned -1
2019-08-29 17:07:11.561 (22536) - - - - SSHClientBase::run() ssh->lastErrorText():
ChilkatLog:
ChannelPoll:
ChilkatVersion: 9.5.0.61
This channel already received the EOF.
Sent SSH Channel CLOSE
--ChannelPoll
--ChilkatLog

2019-08-29 17:07:11.561 (22536) SSHClientBase::run() channel is [connected/open]:


[1/0]
2019-08-29 17:07:11.561 (22536) SSHClientBase::run() - Calling
cleanupTerminalType()
2019-08-29 17:07:11.561 (22536) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-08-29 17:07:11.561 (22536) SSHClientBase::run() - Calling ssh->Disconnect()
2019-08-29 17:07:11.663 (22536) SSHClientBase::run() - Calling ssh->Dispose()
2019-08-29 17:07:11.663 (22536) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-08-29 17:07:11.708 (1504) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-08-29 17:07:11.708 (1504) SshLogFile::~SshLogFile() - Destroying object
2019-09-02 16:42:05.212 (11612) SSHClientBase::run() gAuthentication = 1
2019-09-02 16:42:05.752 (11612) SSHClient_Pw::authenticate() login name: sent
2019-09-02 17:16:14.992 (16240) SSHClientBase::run() gAuthentication = 1
2019-09-02 17:16:15.710 (16240) SSHClient_Pw::authenticate() login name: sent
2019-09-02 17:16:23.054 (16240) SSHClient_Pw::authenticate() received login name:
tsadmin
2019-09-02 17:16:23.054 (16240) SSHClient_Pw::authenticate() password prompt sent
2019-09-02 17:16:39.024 (16240) SSHClient_Pw::authenticate() password received
2019-09-02 17:16:39.024 (16240) SSHClient_Pw::authenticate() authenticating towards
10.3.16.9
2019-09-02 17:16:39.024 (16240) SSHClient_Pw::authenticate() username: tsadmin
2019-09-02 17:16:39.024 (16240) SSHClient_Pw::authenticate() length(password): 17
2019-09-02 17:16:43.861 (16240) SSHClient_Pw::authenticate() AuthenticatePw()
failed ssh->lastErrorText(): ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
passwordAuth:
Sent login/password
Authentication failed or partial success. (1)
PartialSuccess1: 0
AuthList: publickey,password,keyboard-interactive
important:
This is likely a simple invalid login and/or password error,
meaning your application did not send the correct login and/or password.
--important
--passwordAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-09-02 17:16:43.861 (16240) SSHClient_Pw::authenticate()


get_PasswordChangeRequested() == false
2019-09-02 17:16:43.861 (16240) SSHClient_Pw::authenticate() is connected,
authentication failure towards 10.3.16.9
ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
Connected.
--IsConnected
--ChilkatLog

2019-09-02 17:16:43.861 (16240) SSHClient_Pw::retryAuthenticate() password prompt


sent
2019-09-02 17:17:16.993 (12340) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-09-02 17:17:17.009 (16240) SSHClient_Pw::retryAuthenticate() password received
2019-09-02 17:17:17.009 (16240) SSHClient_Pw::retryAuthenticate() authenticating
towards 10.3.16.9
2019-09-02 17:17:23.808 (16240) SSHClient_Pw::authenticate() authentication failure
towards 10.3.16.9
2019-09-02 17:17:23.808 (16240) SSHClient_Pw::authenticate() ssh->lastErrorText():
ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
Password is empty. Choosing keyboard-interactive login instead.
keyboardInteractiveAuth:
Sent keyboard-interactive request
userAuthInfoRequest:
parseUserAuthInfoRequest:
name:
instruction:
language:
numPrompts: 1
prompt:
********************************************************************************
IF YOU ARE NOT AN AUTHORIZED USER, PLEASE EXIT IMMEDIATELY.
********************************************************************************
Password:
echo: 0
--parseUserAuthInfoRequest
Sending password...
sshKeyboardInteractive:
Sent keyboard-interactive response.
userAuthNonSuccess:
partialSuccess: 0
authList: publickey,password,keyboard-interactive
--userAuthNonSuccess
--sshKeyboardInteractive
keyboard-interactive authentication failed (A)
--userAuthInfoRequest
--keyboardInteractiveAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-09-02 17:17:23.808 (16240) SSHClientBase::run() failed to authenticate ssh-


>lastErrorText(): ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
Connected.
--IsConnected
--ChilkatLog

2019-09-02 17:17:23.808 (16240) SSHClientBase::run() - Calling


cleanupTerminalType()
2019-09-02 17:17:23.808 (16240) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-09-02 17:17:23.824 (16240) SSHClientBase::run() - Calling ssh->Disconnect()
2019-09-02 17:17:23.925 (16240) SSHClientBase::run() - Calling ssh->Dispose()
2019-09-02 17:17:23.925 (16240) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-09-02 17:17:23.925 (12340) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-09-02 17:17:23.940 (12188) SSHClientBase::run() gAuthentication = 1
2019-09-02 17:17:24.356 (12188) SSHClient_Pw::authenticate() login name: sent
2019-09-02 17:17:26.899 (12188) SSHClient_Pw::authenticate() received login name:
tsadmin
2019-09-02 17:17:26.899 (12188) SSHClient_Pw::authenticate() password prompt sent
2019-09-02 17:17:32.508 (12188) SSHClient_Pw::authenticate() password received
2019-09-02 17:17:32.508 (12188) SSHClient_Pw::authenticate() authenticating towards
10.3.16.11
2019-09-02 17:17:32.508 (12188) SSHClient_Pw::authenticate() username: tsadmin
2019-09-02 17:17:32.508 (12188) SSHClient_Pw::authenticate() length(password): 16
2019-09-02 17:17:33.032 (12188) SSHClient_Pw::authenticate()
get_PasswordChangeRequested() == false
2019-09-02 17:17:33.032 (12188) SSHClientBase::run() authentication successful
2019-09-02 17:17:33.064 (12188) SSHClientBase::run() ssh->OpenSessionChannel()
success, channelNum=0
2019-09-02 17:17:33.110 (12188) SSHClientBase::run() ssh->get_MaxPacketSize(): 2048
2019-09-02 17:21:39.371 (12188) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 0
2019-09-02 17:21:39.371 (12188) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-09-02 17:21:39.371 (12188) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-09-02 17:21:39.371 (12188) SSHClientBase::run() n == 0, this->username:
tsadmin
2019-09-02 17:21:39.371 (12188) SSHClientBase::run() n == 0, length(newPassword): 0
2019-09-02 17:21:39.371 (12188) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 1
2019-09-02 17:21:39.371 (12188) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-09-02 17:21:39.371 (12188) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-09-02 17:21:39.371 (12188) SSHClientBase::run() n == 0, this->username:
tsadmin
2019-09-02 17:21:39.371 (12188) SSHClientBase::run() n == 0, length(newPassword): 0
2019-09-02 17:21:39.371 (12188) SSHClientBase::run() - ssh->ChannelReadAndPoll2()
returned -1
2019-09-02 17:21:39.371 (12188) - - - - SSHClientBase::run() ssh->lastErrorText():
ChilkatLog:
ChannelPoll:
ChilkatVersion: 9.5.0.61
This channel already received the EOF.
Sent SSH Channel CLOSE
--ChannelPoll
--ChilkatLog

2019-09-02 17:21:39.371 (12188) SSHClientBase::run() channel is [connected/open]:


[1/0]
2019-09-02 17:21:39.371 (12188) SSHClientBase::run() - Calling
cleanupTerminalType()
2019-09-02 17:21:39.371 (12188) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-09-02 17:21:39.371 (12188) SSHClientBase::run() - Calling ssh->Disconnect()
2019-09-02 17:21:39.403 (12188) SSHClientBase::run() - Calling ssh->Dispose()
2019-09-02 17:21:39.403 (12188) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-09-02 17:21:39.403 (12028) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-09-02 17:21:39.403 (12028) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-09-02 17:21:41.683 (14596) SSHClientBase::run() gAuthentication = 1
2019-09-02 17:21:42.407 (14596) SSHClient_Pw::authenticate() login name: sent
2019-09-02 17:21:45.850 (14596) SSHClient_Pw::authenticate() received login name:
ts_frutos
2019-09-02 17:21:45.850 (14596) SSHClient_Pw::authenticate() password prompt sent
2019-09-02 17:21:49.352 (14596) SSHClient_Pw::authenticate() password received
2019-09-02 17:21:49.352 (14596) SSHClient_Pw::authenticate() authenticating towards
10.3.16.11
2019-09-02 17:21:49.352 (14596) SSHClient_Pw::authenticate() username: ts_frutos
2019-09-02 17:21:49.352 (14596) SSHClient_Pw::authenticate() length(password): 10
2019-09-02 17:21:49.490 (14596) SSHClient_Pw::authenticate()
get_PasswordChangeRequested() == false
2019-09-02 17:21:49.490 (14596) SSHClientBase::run() authentication successful
2019-09-02 17:21:49.521 (14596) SSHClientBase::run() ssh->OpenSessionChannel()
success, channelNum=0
2019-09-02 17:21:49.552 (14596) SSHClientBase::run() ssh->get_MaxPacketSize(): 2048
2019-09-02 17:22:16.032 (14596) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 1
2019-09-02 17:22:16.032 (14596) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-09-02 17:22:16.032 (14596) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-09-02 17:22:16.032 (14596) SSHClientBase::run() n == 0, this->username:
ts_frutos
2019-09-02 17:22:16.032 (14596) SSHClientBase::run() n == 0, length(newPassword): 0
2019-09-02 17:22:16.032 (14596) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 1
2019-09-02 17:22:16.032 (14596) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-09-02 17:22:16.032 (14596) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-09-02 17:22:16.032 (14596) SSHClientBase::run() n == 0, this->username:
ts_frutos
2019-09-02 17:22:16.032 (14596) SSHClientBase::run() n == 0, length(newPassword): 0
2019-09-02 17:22:16.032 (14596) SSHClientBase::run() - ssh->ChannelReadAndPoll2()
returned -1
2019-09-02 17:22:16.032 (14596) - - - - SSHClientBase::run() ssh->lastErrorText():
ChilkatLog:
ChannelPoll:
ChilkatVersion: 9.5.0.61
This channel already received the EOF.
Sent SSH Channel CLOSE
--ChannelPoll
--ChilkatLog

2019-09-02 17:22:16.032 (14596) SSHClientBase::run() channel is [connected/open]:


[1/0]
2019-09-02 17:22:16.032 (14596) SSHClientBase::run() - Calling
cleanupTerminalType()
2019-09-02 17:22:16.032 (14596) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-09-02 17:22:16.032 (14596) SSHClientBase::run() - Calling ssh->Disconnect()
2019-09-02 17:22:16.100 (14596) SSHClientBase::run() - Calling ssh->Dispose()
2019-09-02 17:22:16.100 (14596) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-09-02 17:22:16.100 (16168) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-09-02 17:22:16.100 (16168) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-09-02 17:22:17.485 (14040) SSHClientBase::run() gAuthentication = 1
2019-09-02 17:22:17.925 (14040) SSHClient_Pw::authenticate() login name: sent
2019-09-02 17:22:20.116 (14040) SSHClient_Pw::authenticate() received login name:
ts_frutos
2019-09-02 17:22:20.116 (14040) SSHClient_Pw::authenticate() password prompt sent
2019-09-02 17:22:22.944 (14040) SSHClient_Pw::authenticate() password received
2019-09-02 17:22:22.944 (14040) SSHClient_Pw::authenticate() authenticating towards
10.3.16.11
2019-09-02 17:22:22.944 (14040) SSHClient_Pw::authenticate() username: ts_frutos
2019-09-02 17:22:22.944 (14040) SSHClient_Pw::authenticate() length(password): 10
2019-09-02 17:22:23.144 (14040) SSHClient_Pw::authenticate()
get_PasswordChangeRequested() == false
2019-09-02 17:22:23.144 (14040) SSHClientBase::run() authentication successful
2019-09-02 17:22:23.191 (14040) SSHClientBase::run() ssh->OpenSessionChannel()
success, channelNum=0
2019-09-02 17:22:23.229 (14040) SSHClientBase::run() ssh->get_MaxPacketSize(): 2048
2019-09-02 17:22:49.977 (14040) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 0
2019-09-02 17:22:49.977 (14040) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-09-02 17:22:49.977 (14040) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-09-02 17:22:49.977 (14040) SSHClientBase::run() n == 0, this->username:
ts_frutos
2019-09-02 17:22:49.977 (14040) SSHClientBase::run() n == 0, length(newPassword): 0
2019-09-02 17:22:49.977 (14040) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 1
2019-09-02 17:22:49.977 (14040) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-09-02 17:22:49.977 (14040) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-09-02 17:22:49.977 (14040) SSHClientBase::run() n == 0, this->username:
ts_frutos
2019-09-02 17:22:49.977 (14040) SSHClientBase::run() n == 0, length(newPassword): 0
2019-09-02 17:22:49.977 (14040) SSHClientBase::run() - ssh->ChannelReadAndPoll2()
returned -1
2019-09-02 17:22:49.977 (14040) - - - - SSHClientBase::run() ssh->lastErrorText():
ChilkatLog:
ChannelPoll:
ChilkatVersion: 9.5.0.61
This channel already received the EOF.
Sent SSH Channel CLOSE
--ChannelPoll
--ChilkatLog

2019-09-02 17:22:49.977 (14040) SSHClientBase::run() channel is [connected/open]:


[1/0]
2019-09-02 17:22:49.977 (14040) SSHClientBase::run() - Calling
cleanupTerminalType()
2019-09-02 17:22:49.977 (14040) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-09-02 17:22:49.977 (14040) SSHClientBase::run() - Calling ssh->Disconnect()
2019-09-02 17:22:49.992 (14040) SSHClientBase::run() - Calling ssh->Dispose()
2019-09-02 17:22:49.992 (14040) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-09-02 17:22:49.992 (12944) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-09-02 17:22:49.992 (12944) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-09-02 17:22:51.153 (13616) SSHClientBase::run() gAuthentication = 1
2019-09-02 17:22:51.569 (13616) SSHClient_Pw::authenticate() login name: sent
2019-09-02 17:22:53.379 (13616) SSHClient_Pw::authenticate() received login name:
ts_frutos
2019-09-02 17:22:53.379 (13616) SSHClient_Pw::authenticate() password prompt sent
2019-09-02 17:22:56.462 (13616) SSHClient_Pw::authenticate() password received
2019-09-02 17:22:56.462 (13616) SSHClient_Pw::authenticate() authenticating towards
10.3.16.11
2019-09-02 17:22:56.462 (13616) SSHClient_Pw::authenticate() username: ts_frutos
2019-09-02 17:22:56.462 (13616) SSHClient_Pw::authenticate() length(password): 9
2019-09-02 17:22:56.625 (13616) SSHClient_Pw::authenticate()
get_PasswordChangeRequested() == false
2019-09-02 17:22:56.625 (13616) SSHClientBase::run() authentication successful
2019-09-02 17:22:56.647 (13616) SSHClientBase::run() ssh->OpenSessionChannel()
success, channelNum=0
2019-09-02 17:22:56.679 (13616) SSHClientBase::run() ssh->get_MaxPacketSize(): 2048
2019-09-02 17:36:51.701 (12340) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-09-02 17:36:51.717 (13616) SSHClientBase::run() - thread stop has been
requested
2019-09-02 17:36:51.717 (13616) SSHClientBase::run() - Calling
cleanupTerminalType()
2019-09-02 17:36:51.717 (13616) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-09-02 17:36:51.717 (13616) SSHClientBase::run() - Calling ssh->Disconnect()
2019-09-02 17:36:51.733 (13616) SSHClientBase::run() - Calling ssh->Dispose()
2019-09-02 17:36:51.733 (13616) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-09-02 17:36:51.733 (12340) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-09-02 17:36:53.402 (3468) SSHClientBase::run() gAuthentication = 1
2019-09-02 17:36:53.761 (3468) SSHClient_Pw::authenticate() login name: sent
2019-09-02 17:36:57.764 (3468) SSHClient_Pw::authenticate() received login name:
tsadmin
2019-09-02 17:36:57.764 (3468) SSHClient_Pw::authenticate() password prompt sent
2019-09-02 17:37:09.213 (3468) SSHClient_Pw::authenticate() password received
2019-09-02 17:37:09.213 (3468) SSHClient_Pw::authenticate() authenticating towards
10.3.16.11
2019-09-02 17:37:09.213 (3468) SSHClient_Pw::authenticate() username: tsadmin
2019-09-02 17:37:09.213 (3468) SSHClient_Pw::authenticate() length(password): 16
2019-09-02 17:37:09.614 (3468) SSHClient_Pw::authenticate()
get_PasswordChangeRequested() == false
2019-09-02 17:37:09.614 (3468) SSHClientBase::run() authentication successful
2019-09-02 17:37:09.630 (3468) SSHClientBase::run() ssh->OpenSessionChannel()
success, channelNum=0
2019-09-02 17:37:09.630 (3468) SSHClientBase::run() ssh->get_MaxPacketSize(): 2048
2019-09-02 18:07:21.514 (3468) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 0
2019-09-02 18:07:21.514 (3468) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-09-02 18:07:21.514 (3468) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-09-02 18:07:21.514 (3468) SSHClientBase::run() n == 0, this->username: tsadmin
2019-09-02 18:07:21.514 (3468) SSHClientBase::run() n == 0, length(newPassword): 0
2019-09-02 18:07:21.514 (3468) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 1
2019-09-02 18:07:21.514 (3468) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-09-02 18:07:21.514 (3468) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-09-02 18:07:21.514 (3468) SSHClientBase::run() n == 0, this->username: tsadmin
2019-09-02 18:07:21.514 (3468) SSHClientBase::run() n == 0, length(newPassword): 0
2019-09-02 18:07:21.514 (3468) SSHClientBase::run() - ssh->ChannelReadAndPoll2()
returned -1
2019-09-02 18:07:21.514 (3468) - - - - SSHClientBase::run() ssh->lastErrorText():
ChilkatLog:
ChannelPoll:
ChilkatVersion: 9.5.0.61
This channel already received the EOF.
Sent SSH Channel CLOSE
--ChannelPoll
--ChilkatLog

2019-09-02 18:07:21.514 (3468) SSHClientBase::run() channel is [connected/open]:


[1/0]
2019-09-02 18:07:21.514 (3468) SSHClientBase::run() - Calling cleanupTerminalType()
2019-09-02 18:07:21.514 (3468) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-09-02 18:07:21.514 (3468) SSHClientBase::run() - Calling ssh->Disconnect()
2019-09-02 18:07:21.530 (3468) SSHClientBase::run() - Calling ssh->Dispose()
2019-09-02 18:07:21.530 (3468) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-09-02 18:07:21.530 (7976) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-09-02 18:07:21.530 (7976) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-09-06 14:48:44.953 (16536) SSHClientBase::run() gAuthentication = 1
2019-09-06 14:48:45.392 (16536) SSHClient_Pw::authenticate() login name: sent
2019-09-06 14:48:49.602 (16536) SSHClient_Pw::authenticate() received login name:
tsadmin
2019-09-06 14:48:49.602 (16536) SSHClient_Pw::authenticate() password prompt sent
2019-09-06 14:48:55.129 (16536) SSHClient_Pw::authenticate() password received
2019-09-06 14:48:55.129 (16536) SSHClient_Pw::authenticate() authenticating towards
10.3.6.5
2019-09-06 14:48:55.129 (16536) SSHClient_Pw::authenticate() username: tsadmin
2019-09-06 14:48:55.129 (16536) SSHClient_Pw::authenticate() length(password): 16
2019-09-06 14:49:00.981 (16536) SSHClient_Pw::authenticate() AuthenticatePw()
failed ssh->lastErrorText(): ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
passwordAuth:
Sent login/password
Authentication failed or partial success. (1)
PartialSuccess1: 0
AuthList: publickey,password,keyboard-interactive
important:
This is likely a simple invalid login and/or password error,
meaning your application did not send the correct login and/or password.
--important
--passwordAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-09-06 14:49:00.981 (16536) SSHClient_Pw::authenticate()


get_PasswordChangeRequested() == false
2019-09-06 14:49:00.981 (16536) SSHClient_Pw::authenticate() is connected,
authentication failure towards 10.3.6.5
ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
Connected.
--IsConnected
--ChilkatLog

2019-09-06 14:49:00.981 (16536) SSHClient_Pw::retryAuthenticate() password prompt


sent
2019-09-06 14:49:10.832 (12340) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-09-06 14:49:10.881 (16536) SSHClient_Pw::retryAuthenticate() password received
2019-09-06 14:49:10.881 (16536) SSHClient_Pw::retryAuthenticate() authenticating
towards 10.3.6.5
2019-09-06 14:49:15.561 (16536) SSHClient_Pw::authenticate() authentication failure
towards 10.3.6.5
2019-09-06 14:49:15.561 (16536) SSHClient_Pw::authenticate() ssh->lastErrorText():
ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
Password is empty. Choosing keyboard-interactive login instead.
keyboardInteractiveAuth:
Sent keyboard-interactive request
userAuthInfoRequest:
parseUserAuthInfoRequest:
name:
instruction:
language:
numPrompts: 1
prompt:
********************************************************************************
IF YOU ARE NOT AN AUTHORIZED USER, PLEASE EXIT IMMEDIATELY.
********************************************************************************
Password:
echo: 0
--parseUserAuthInfoRequest
Sending password...
sshKeyboardInteractive:
Sent keyboard-interactive response.
userAuthNonSuccess:
partialSuccess: 0
authList: publickey,password,keyboard-interactive
--userAuthNonSuccess
--sshKeyboardInteractive
keyboard-interactive authentication failed (A)
--userAuthInfoRequest
--keyboardInteractiveAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-09-06 14:49:15.565 (16536) SSHClientBase::run() failed to authenticate ssh-


>lastErrorText(): ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
Connected.
--IsConnected
--ChilkatLog

2019-09-06 14:49:15.565 (16536) SSHClientBase::run() - Calling


cleanupTerminalType()
2019-09-06 14:49:15.565 (16536) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-09-06 14:49:15.565 (16536) SSHClientBase::run() - Calling ssh->Disconnect()
2019-09-06 14:49:15.591 (16536) SSHClientBase::run() - Calling ssh->Dispose()
2019-09-06 14:49:15.591 (16536) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-09-06 14:49:15.591 (12340) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-09-11 14:40:43.119 (12204) SSHClientBase::run() gAuthentication = 1
2019-09-11 14:40:43.510 (12204) SSHClient_Pw::authenticate() login name: sent
2019-09-11 17:33:55.679 (9424) SSHClientBase::run() gAuthentication = 1
2019-09-11 17:33:56.149 (9424) SSHClient_Pw::authenticate() login name: sent
2019-09-16 10:51:14.801 (9424) SSHClient_Pw::authenticate() received login name:
tsadmin
2019-09-16 10:51:14.801 (9424) SSHClient_Pw::authenticate() password prompt sent
2019-09-16 10:51:23.381 (9424) SSHClient_Pw::authenticate() password received
2019-09-16 10:51:23.381 (9424) SSHClient_Pw::authenticate() authenticating towards
10.3.16.11
2019-09-16 10:51:23.381 (9424) SSHClient_Pw::authenticate() username: tsadmin
2019-09-16 10:51:23.381 (9424) SSHClient_Pw::authenticate() length(password): 16
2019-09-16 10:51:23.531 (9424) SSHClient_Pw::authenticate() AuthenticatePw() failed
ssh->lastErrorText(): ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
No longer connected to the SSH server.
--AuthenticatePw
--ChilkatLog

2019-09-16 10:51:23.531 (9424) SSHClient_Pw::authenticate()


get_PasswordChangeRequested() == false
2019-09-16 10:51:24.410 (9424) SSHClient_Pw::authenticate() connection lost,
reconnect result: 1
2019-09-16 10:51:24.410 (9424) SSHClient_Pw::authenticate() ssh->lastErrorText():
ChilkatLog:
Connect_Ssh:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
connectInner:
hostname: 10.3.16.11
port: 4422
sshConnect:
Established TCP/IP connection with SSH server
--sshConnect
sshSetupConnection:
clientIdentifier: SSH-2.0-PuTTY_Release_0.66
Sending client identifier...
Done sending client identifier.
Reading server version...
initialDataFromSshServer: SSH-2.0-OpenSSH_6.6.1

serverVersion: SSH-2.0-OpenSSH_6.6.1
KeyExchangeAlgs:
algorithm: curve25519-sha256@libssh.org
algorithm: ecdh-sha2-nistp256
algorithm: ecdh-sha2-nistp384
algorithm: ecdh-sha2-nistp521
algorithm: diffie-hellman-group-exchange-sha256
algorithm: diffie-hellman-group-exchange-sha1
algorithm: diffie-hellman-group14-sha1
algorithm: diffie-hellman-group1-sha1
--KeyExchangeAlgs
HostKeyAlgs:
algorithm: ssh-rsa
algorithm: ssh-dss
algorithm: ecdsa-sha2-nistp256
algorithm: ssh-ed25519
--HostKeyAlgs
EncCS:
algorithm: aes128-ctr
algorithm: aes256-ctr
algorithm: arcfour256
algorithm: arcfour
algorithm: aes128-cbc
algorithm: aes256-cbc
--EncCS
EncSC:
algorithm: aes128-ctr
algorithm: aes256-ctr
algorithm: arcfour256
algorithm: arcfour
algorithm: aes128-cbc
algorithm: aes256-cbc
--EncSC
MacCS:
algorithm: hmac-md5-etm@openssh.com
algorithm: hmac-sha1-etm@openssh.com
algorithm: umac-64-etm@openssh.com
algorithm: umac-128-etm@openssh.com
algorithm: hmac-sha2-256-etm@openssh.com
algorithm: hmac-sha2-512-etm@openssh.com
algorithm: hmac-ripemd160-etm@openssh.com
algorithm: hmac-sha1-96-etm@openssh.com
algorithm: hmac-md5-96-etm@openssh.com
algorithm: hmac-md5
algorithm: hmac-sha1
algorithm: umac-64@openssh.com
algorithm: umac-128@openssh.com
algorithm: hmac-sha2-256
algorithm: hmac-sha2-512
algorithm: hmac-ripemd160
algorithm: hmac-ripemd160@openssh.com
algorithm: hmac-sha1-96
algorithm: hmac-md5-96
--MacCS
MacSC:
algorithm: hmac-md5-etm@openssh.com
algorithm: hmac-sha1-etm@openssh.com
algorithm: umac-64-etm@openssh.com
algorithm: umac-128-etm@openssh.com
algorithm: hmac-sha2-256-etm@openssh.com
algorithm: hmac-sha2-512-etm@openssh.com
algorithm: hmac-ripemd160-etm@openssh.com
algorithm: hmac-sha1-96-etm@openssh.com
algorithm: hmac-md5-96-etm@openssh.com
algorithm: hmac-md5
algorithm: hmac-sha1
algorithm: umac-64@openssh.com
algorithm: umac-128@openssh.com
algorithm: hmac-sha2-256
algorithm: hmac-sha2-512
algorithm: hmac-ripemd160
algorithm: hmac-ripemd160@openssh.com
algorithm: hmac-sha1-96
algorithm: hmac-md5-96
--MacSC
CompCS:
algorithm: none
algorithm: zlib@openssh.com
--CompCS
CompSC:
algorithm: none
algorithm: zlib@openssh.com
--CompSC
ChosenIncomingEncryption: aes256-ctr
ChosenOutgoingEncryptoin: aes256-ctr
ChosenIncomingMac: hmac-sha2-256
ChosenOutgoingMac: hmac-sha2-256
ChosenIncomingCompression: zlib@openssh.com
ChosenOutgoingCompression: zlib@openssh.com
ChosenKexAlgorithm: diffie-hellman-group-exchange-sha256
ChosenHostKeyAlgorithm: ssh-rsa
Received GEX Group.
Using SHA256 for Key Exchange Hash
RSA host key parsed successfully.
Sending newkeys to server...
Expecting newkeys from server...
SSH Key Exchange Success.
installNewKeys:
m_isRekey: 0
Delay compression until after USERAUTH_SUCCESS
No outgoing compression.
No incoming compression.
Outgoing encryption is now AES 256 CTR
outgoingMac: SHA256
--installNewKeys
--sshSetupConnection
socketOptions:
SO_SNDBUF: 262144
SO_RCVBUF: 4194304
TCP_NODELAY: 1
SO_KEEPALIVE: 0
--socketOptions
--connectInner
Success.
--Connect_Ssh
--ChilkatLog

2019-09-16 10:51:25.181 (9424) SSHClientBase::run() authentication successful


2019-09-16 10:51:25.241 (9424) SSHClientBase::run() ssh->OpenSessionChannel()
success, channelNum=0
2019-09-16 10:51:25.251 (9424) SSHClientBase::run() ssh->get_MaxPacketSize(): 2048
2019-09-16 10:53:39.430 (9424) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 0
2019-09-16 10:53:39.430 (9424) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-09-16 10:53:39.430 (9424) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-09-16 10:53:39.430 (9424) SSHClientBase::run() n == 0, this->username: tsadmin
2019-09-16 10:53:39.430 (9424) SSHClientBase::run() n == 0, length(newPassword): 0
2019-09-16 10:53:39.430 (9424) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 1
2019-09-16 10:53:39.430 (9424) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-09-16 10:53:39.430 (9424) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-09-16 10:53:39.430 (9424) SSHClientBase::run() n == 0, this->username: tsadmin
2019-09-16 10:53:39.430 (9424) SSHClientBase::run() n == 0, length(newPassword): 0
2019-09-16 10:53:39.430 (9424) SSHClientBase::run() - ssh->ChannelReadAndPoll2()
returned -1
2019-09-16 10:53:39.430 (9424) - - - - SSHClientBase::run() ssh->lastErrorText():
ChilkatLog:
ChannelPoll:
ChilkatVersion: 9.5.0.61
This channel already received the EOF.
Sent SSH Channel CLOSE
--ChannelPoll
--ChilkatLog

2019-09-16 10:53:39.430 (9424) SSHClientBase::run() channel is [connected/open]:


[1/0]
2019-09-16 10:53:39.430 (9424) SSHClientBase::run() - Calling cleanupTerminalType()
2019-09-16 10:53:39.430 (9424) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-09-16 10:53:39.430 (9424) SSHClientBase::run() - Calling ssh->Disconnect()
2019-09-16 10:53:39.471 (9424) SSHClientBase::run() - Calling ssh->Dispose()
2019-09-16 10:53:39.471 (9424) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-09-16 10:53:39.501 (392) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-09-16 10:53:39.501 (392) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-09-16 10:53:40.651 (796) SSHClientBase::run() gAuthentication = 1
2019-09-16 10:53:41.625 (796) SSHClient_Pw::authenticate() login name: sent
2019-09-16 10:53:41.680 (796) SSHClient_Pw::authenticate() received login name:
/opt/com/bin/cliss
2019-09-16 10:53:41.680 (796) SSHClient_Pw::authenticate() password prompt sent
2019-09-16 10:53:46.891 (796) SSHClient_Pw::authenticate() password received
2019-09-16 10:53:46.891 (796) SSHClient_Pw::authenticate() authenticating towards
10.3.16.11
2019-09-16 10:53:46.891 (796) SSHClient_Pw::authenticate() username:
/opt/com/bin/cliss
2019-09-16 10:53:46.891 (796) SSHClient_Pw::authenticate() length(password): 0
2019-09-16 10:53:52.072 (796) SSHClient_Pw::authenticate() AuthenticatePw() failed
ssh->lastErrorText(): ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
Password is empty. Choosing keyboard-interactive login instead.
keyboardInteractiveAuth:
Sent keyboard-interactive request
userAuthInfoRequest:
parseUserAuthInfoRequest:
name:
instruction:
language:
numPrompts: 1
prompt:
********************************************************************************
IF YOU ARE NOT AN AUTHORIZED USER, PLEASE EXIT IMMEDIATELY.
********************************************************************************
Password:
echo: 0
--parseUserAuthInfoRequest
Sending password...
sshKeyboardInteractive:
Sent keyboard-interactive response.
userAuthNonSuccess:
partialSuccess: 0
authList: publickey,password,keyboard-interactive
--userAuthNonSuccess
--sshKeyboardInteractive
keyboard-interactive authentication failed (A)
--userAuthInfoRequest
--keyboardInteractiveAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-09-16 10:53:52.072 (796) SSHClient_Pw::authenticate()


get_PasswordChangeRequested() == false
2019-09-16 10:53:52.072 (796) SSHClient_Pw::authenticate() is connected,
authentication failure towards 10.3.16.11
ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
Connected.
--IsConnected
--ChilkatLog

2019-09-16 10:53:52.072 (796) SSHClient_Pw::retryAuthenticate() password prompt


sent
2019-09-16 10:53:55.841 (796) SSHClient_Pw::retryAuthenticate() password received
2019-09-16 10:53:55.841 (796) SSHClient_Pw::retryAuthenticate() authenticating
towards 10.3.16.11
2019-09-16 10:53:58.900 (11576) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-09-16 10:54:01.541 (796) SSHClient_Pw::authenticate() authentication failure
towards 10.3.16.11
2019-09-16 10:54:01.541 (796) SSHClient_Pw::authenticate() ssh->lastErrorText():
ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
Password is empty. Choosing keyboard-interactive login instead.
keyboardInteractiveAuth:
Sent keyboard-interactive request
userAuthInfoRequest:
parseUserAuthInfoRequest:
name:
instruction:
language:
numPrompts: 1
prompt:
********************************************************************************
IF YOU ARE NOT AN AUTHORIZED USER, PLEASE EXIT IMMEDIATELY.
********************************************************************************
Password:
echo: 0
--parseUserAuthInfoRequest
Sending password...
sshKeyboardInteractive:
Sent keyboard-interactive response.
userAuthNonSuccess:
partialSuccess: 0
authList: publickey,password,keyboard-interactive
--userAuthNonSuccess
--sshKeyboardInteractive
keyboard-interactive authentication failed (A)
--userAuthInfoRequest
--keyboardInteractiveAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog
2019-09-16 10:54:01.541 (796) SSHClientBase::run() failed to authenticate ssh-
>lastErrorText(): ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
Connected.
--IsConnected
--ChilkatLog

2019-09-16 10:54:01.541 (796) SSHClientBase::run() - Calling cleanupTerminalType()


2019-09-16 10:54:01.541 (796) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-09-16 10:54:01.541 (796) SSHClientBase::run() - Calling ssh->Disconnect()
2019-09-16 10:54:01.561 (796) SSHClientBase::run() - Calling ssh->Dispose()
2019-09-16 10:54:01.561 (796) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-09-16 10:54:01.561 (11576) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-09-16 10:54:04.091 (9892) SSHClientBase::run() gAuthentication = 1
2019-09-16 10:54:04.965 (9892) SSHClient_Pw::authenticate() login name: sent
2019-09-16 10:54:19.061 (9892) SSHClient_Pw::authenticate() received login name:
ts_frutos
2019-09-16 10:54:19.061 (9892) SSHClient_Pw::authenticate() password prompt sent
2019-09-16 10:54:22.901 (9892) SSHClient_Pw::authenticate() password received
2019-09-16 10:54:22.901 (9892) SSHClient_Pw::authenticate() authenticating towards
10.3.16.11
2019-09-16 10:54:22.901 (9892) SSHClient_Pw::authenticate() username: ts_frutos
2019-09-16 10:54:22.901 (9892) SSHClient_Pw::authenticate() length(password): 10
2019-09-16 10:54:27.951 (9892) SSHClient_Pw::authenticate() AuthenticatePw() failed
ssh->lastErrorText(): ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
passwordAuth:
Sent login/password
Authentication failed or partial success. (1)
PartialSuccess1: 0
AuthList: publickey,password,keyboard-interactive
important:
This is likely a simple invalid login and/or password error,
meaning your application did not send the correct login and/or password.
--important
--passwordAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-09-16 10:54:27.951 (9892) SSHClient_Pw::authenticate()


get_PasswordChangeRequested() == false
2019-09-16 10:54:27.951 (9892) SSHClient_Pw::authenticate() is connected,
authentication failure towards 10.3.16.11
ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
Connected.
--IsConnected
--ChilkatLog

2019-09-16 10:54:27.951 (9892) SSHClient_Pw::retryAuthenticate() password prompt


sent
2019-09-16 10:54:31.830 (11576) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-09-16 10:54:31.861 (9892) SSHClient_Pw::retryAuthenticate() password received
2019-09-16 10:54:31.861 (9892) SSHClient_Pw::retryAuthenticate() authenticating
towards 10.3.16.11
2019-09-16 10:54:38.380 (9892) SSHClient_Pw::authenticate() authentication failure
towards 10.3.16.11
2019-09-16 10:54:38.380 (9892) SSHClient_Pw::authenticate() ssh->lastErrorText():
ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
Password is empty. Choosing keyboard-interactive login instead.
keyboardInteractiveAuth:
Sent keyboard-interactive request
userAuthInfoRequest:
parseUserAuthInfoRequest:
name:
instruction:
language:
numPrompts: 1
prompt:
********************************************************************************
IF YOU ARE NOT AN AUTHORIZED USER, PLEASE EXIT IMMEDIATELY.
********************************************************************************
Password:
echo: 0
--parseUserAuthInfoRequest
Sending password...
sshKeyboardInteractive:
Sent keyboard-interactive response.
userAuthNonSuccess:
partialSuccess: 0
authList: publickey,password,keyboard-interactive
--userAuthNonSuccess
--sshKeyboardInteractive
keyboard-interactive authentication failed (A)
--userAuthInfoRequest
--keyboardInteractiveAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-09-16 10:54:38.380 (9892) SSHClientBase::run() failed to authenticate ssh-


>lastErrorText(): ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
Connected.
--IsConnected
--ChilkatLog

2019-09-16 10:54:38.380 (9892) SSHClientBase::run() - Calling cleanupTerminalType()


2019-09-16 10:54:38.380 (9892) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-09-16 10:54:38.380 (9892) SSHClientBase::run() - Calling ssh->Disconnect()
2019-09-16 10:54:38.461 (9892) SSHClientBase::run() - Calling ssh->Dispose()
2019-09-16 10:54:38.461 (9892) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-09-16 10:54:38.461 (11576) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-09-16 10:54:39.611 (17904) SSHClientBase::run() gAuthentication = 1
2019-09-16 10:54:40.602 (17904) SSHClient_Pw::authenticate() login name: sent
2019-09-16 10:54:43.121 (17904) SSHClient_Pw::authenticate() received login name:
tsadmin
2019-09-16 10:54:43.121 (17904) SSHClient_Pw::authenticate() password prompt sent
2019-09-16 10:54:51.381 (17904) SSHClient_Pw::authenticate() password received
2019-09-16 10:54:51.381 (17904) SSHClient_Pw::authenticate() authenticating towards
10.3.16.11
2019-09-16 10:54:51.381 (17904) SSHClient_Pw::authenticate() username: tsadmin
2019-09-16 10:54:51.381 (17904) SSHClient_Pw::authenticate() length(password): 16
2019-09-16 10:54:52.660 (17904) SSHClient_Pw::authenticate()
get_PasswordChangeRequested() == false
2019-09-16 10:54:52.660 (17904) SSHClientBase::run() authentication successful
2019-09-16 10:54:52.721 (17904) SSHClientBase::run() ssh->OpenSessionChannel()
success, channelNum=0
2019-09-16 10:54:52.731 (17904) SSHClientBase::run() ssh->get_MaxPacketSize(): 2048
2019-09-16 10:55:38.061 (17904) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 0
2019-09-16 10:55:38.061 (17904) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-09-16 10:55:38.061 (17904) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-09-16 10:55:38.061 (17904) SSHClientBase::run() n == 0, this->username:
tsadmin
2019-09-16 10:55:38.061 (17904) SSHClientBase::run() n == 0, length(newPassword): 0
2019-09-16 10:55:38.061 (17904) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 1
2019-09-16 10:55:38.061 (17904) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-09-16 10:55:38.061 (17904) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-09-16 10:55:38.061 (17904) SSHClientBase::run() n == 0, this->username:
tsadmin
2019-09-16 10:55:38.061 (17904) SSHClientBase::run() n == 0, length(newPassword): 0
2019-09-16 10:55:38.061 (17904) SSHClientBase::run() - ssh->ChannelReadAndPoll2()
returned -1
2019-09-16 10:55:38.061 (17904) - - - - SSHClientBase::run() ssh->lastErrorText():
ChilkatLog:
ChannelPoll:
ChilkatVersion: 9.5.0.61
This channel already received the EOF.
Sent SSH Channel CLOSE
--ChannelPoll
--ChilkatLog

2019-09-16 10:55:38.061 (17904) SSHClientBase::run() channel is [connected/open]:


[1/0]
2019-09-16 10:55:38.061 (17904) SSHClientBase::run() - Calling
cleanupTerminalType()
2019-09-16 10:55:38.061 (17904) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-09-16 10:55:38.061 (17904) SSHClientBase::run() - Calling ssh->Disconnect()
2019-09-16 10:55:38.081 (17904) SSHClientBase::run() - Calling ssh->Dispose()
2019-09-16 10:55:38.081 (17904) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-09-16 10:55:38.081 (19268) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-09-16 10:55:38.081 (19268) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-09-16 10:55:39.061 (19056) SSHClientBase::run() gAuthentication = 1
2019-09-16 10:55:39.971 (19056) SSHClient_Pw::authenticate() login name: sent
2019-09-16 10:55:41.481 (19056) SSHClient_Pw::authenticate() received login name:
ts_frutos
2019-09-16 10:55:41.481 (19056) SSHClient_Pw::authenticate() password prompt sent
2019-09-16 10:55:44.661 (19056) SSHClient_Pw::authenticate() password received
2019-09-16 10:55:44.661 (19056) SSHClient_Pw::authenticate() authenticating towards
10.3.16.11
2019-09-16 10:55:44.661 (19056) SSHClient_Pw::authenticate() username: ts_frutos
2019-09-16 10:55:44.661 (19056) SSHClient_Pw::authenticate() length(password): 10
2019-09-16 10:55:45.101 (19056) SSHClient_Pw::authenticate()
get_PasswordChangeRequested() == false
2019-09-16 10:55:45.101 (19056) SSHClientBase::run() authentication successful
2019-09-16 10:55:45.111 (19056) SSHClientBase::run() ssh->OpenSessionChannel()
success, channelNum=0
2019-09-16 10:55:45.121 (19056) SSHClientBase::run() ssh->get_MaxPacketSize(): 2048
2019-09-16 10:55:57.381 (19056) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 0
2019-09-16 10:55:57.381 (19056) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-09-16 10:55:57.381 (19056) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-09-16 10:55:57.381 (19056) SSHClientBase::run() n == 0, this->username:
ts_frutos
2019-09-16 10:55:57.381 (19056) SSHClientBase::run() n == 0, length(newPassword): 0
2019-09-16 10:55:57.381 (19056) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 1
2019-09-16 10:55:57.381 (19056) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-09-16 10:55:57.381 (19056) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-09-16 10:55:57.381 (19056) SSHClientBase::run() n == 0, this->username:
ts_frutos
2019-09-16 10:55:57.381 (19056) SSHClientBase::run() n == 0, length(newPassword): 0
2019-09-16 10:55:57.381 (19056) SSHClientBase::run() - ssh->ChannelReadAndPoll2()
returned -1
2019-09-16 10:55:57.381 (19056) - - - - SSHClientBase::run() ssh->lastErrorText():
ChilkatLog:
ChannelPoll:
ChilkatVersion: 9.5.0.61
This channel already received the EOF.
Sent SSH Channel CLOSE
--ChannelPoll
--ChilkatLog

2019-09-16 10:55:57.381 (19056) SSHClientBase::run() channel is [connected/open]:


[1/0]
2019-09-16 10:55:57.381 (19056) SSHClientBase::run() - Calling
cleanupTerminalType()
2019-09-16 10:55:57.381 (19056) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-09-16 10:55:57.381 (19056) SSHClientBase::run() - Calling ssh->Disconnect()
2019-09-16 10:55:57.391 (19056) SSHClientBase::run() - Calling ssh->Dispose()
2019-09-16 10:55:57.391 (19056) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-09-16 10:55:57.391 (3632) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-09-16 10:55:57.391 (3632) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-09-16 10:55:58.391 (16856) SSHClientBase::run() gAuthentication = 1
2019-09-16 10:55:59.551 (16856) SSHClient_Pw::authenticate() login name: sent
2019-09-16 10:56:00.571 (16856) SSHClient_Pw::authenticate() received login name:
ts_frutos
2019-09-16 10:56:00.571 (16856) SSHClient_Pw::authenticate() password prompt sent
2019-09-16 10:56:04.291 (16856) SSHClient_Pw::authenticate() password received
2019-09-16 10:56:04.291 (16856) SSHClient_Pw::authenticate() authenticating towards
10.3.16.11
2019-09-16 10:56:04.291 (16856) SSHClient_Pw::authenticate() username: ts_frutos
2019-09-16 10:56:04.291 (16856) SSHClient_Pw::authenticate() length(password): 13
2019-09-16 10:56:04.421 (16856) SSHClient_Pw::authenticate()
get_PasswordChangeRequested() == false
2019-09-16 10:56:04.421 (16856) SSHClientBase::run() authentication successful
2019-09-16 10:56:04.432 (16856) SSHClientBase::run() ssh->OpenSessionChannel()
success, channelNum=0
2019-09-16 10:56:04.441 (16856) SSHClientBase::run() ssh->get_MaxPacketSize(): 2048
2019-09-16 10:56:51.721 (16856) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 0
2019-09-16 10:56:51.721 (16856) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-09-16 10:56:51.721 (16856) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-09-16 10:56:51.721 (16856) SSHClientBase::run() n == 0, this->username:
ts_frutos
2019-09-16 10:56:51.721 (16856) SSHClientBase::run() n == 0, length(newPassword): 0
2019-09-16 10:56:51.721 (16856) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 1
2019-09-16 10:56:51.721 (16856) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-09-16 10:56:51.721 (16856) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-09-16 10:56:51.721 (16856) SSHClientBase::run() n == 0, this->username:
ts_frutos
2019-09-16 10:56:51.721 (16856) SSHClientBase::run() n == 0, length(newPassword): 0
2019-09-16 10:56:51.721 (16856) SSHClientBase::run() - ssh->ChannelReadAndPoll2()
returned -1
2019-09-16 10:56:51.721 (16856) - - - - SSHClientBase::run() ssh->lastErrorText():
ChilkatLog:
ChannelPoll:
ChilkatVersion: 9.5.0.61
This channel already received the EOF.
Sent SSH Channel CLOSE
--ChannelPoll
--ChilkatLog

2019-09-16 10:56:51.721 (16856) SSHClientBase::run() channel is [connected/open]:


[1/0]
2019-09-16 10:56:51.721 (16856) SSHClientBase::run() - Calling
cleanupTerminalType()
2019-09-16 10:56:51.721 (16856) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-09-16 10:56:51.721 (16856) SSHClientBase::run() - Calling ssh->Disconnect()
2019-09-16 10:56:51.761 (16856) SSHClientBase::run() - Calling ssh->Dispose()
2019-09-16 10:56:51.761 (16856) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-09-16 10:56:51.761 (3880) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-09-16 10:56:51.761 (3880) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-09-16 10:56:52.640 (14492) SSHClientBase::run() gAuthentication = 1
2019-09-16 10:56:53.481 (14492) SSHClient_Pw::authenticate() login name: sent
2019-09-16 10:56:53.551 (14492) SSHClient_Pw::authenticate() received login name:
exit;
2019-09-16 10:56:53.551 (14492) SSHClient_Pw::authenticate() password prompt sent
2019-09-16 10:56:57.841 (11576) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-09-16 10:56:57.861 (14492) SSHClient_Pw::authenticate() password received
2019-09-16 10:56:57.861 (14492) SSHClientBase::run() failed to authenticate ssh-
>lastErrorText(): ChilkatLog:
Connect_Ssh:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
connectInner:
hostname: 10.3.16.11
port: 4422
sshConnect:
Established TCP/IP connection with SSH server
--sshConnect
sshSetupConnection:
clientIdentifier: SSH-2.0-PuTTY_Release_0.66
Sending client identifier...
Done sending client identifier.
Reading server version...
initialDataFromSshServer: SSH-2.0-OpenSSH_6.6.1

serverVersion: SSH-2.0-OpenSSH_6.6.1
KeyExchangeAlgs:
algorithm: curve25519-sha256@libssh.org
algorithm: ecdh-sha2-nistp256
algorithm: ecdh-sha2-nistp384
algorithm: ecdh-sha2-nistp521
algorithm: diffie-hellman-group-exchange-sha256
algorithm: diffie-hellman-group-exchange-sha1
algorithm: diffie-hellman-group14-sha1
algorithm: diffie-hellman-group1-sha1
--KeyExchangeAlgs
HostKeyAlgs:
algorithm: ssh-rsa
algorithm: ssh-dss
algorithm: ecdsa-sha2-nistp256
algorithm: ssh-ed25519
--HostKeyAlgs
EncCS:
algorithm: aes128-ctr
algorithm: aes256-ctr
algorithm: arcfour256
algorithm: arcfour
algorithm: aes128-cbc
algorithm: aes256-cbc
--EncCS
EncSC:
algorithm: aes128-ctr
algorithm: aes256-ctr
algorithm: arcfour256
algorithm: arcfour
algorithm: aes128-cbc
algorithm: aes256-cbc
--EncSC
MacCS:
algorithm: hmac-md5-etm@openssh.com
algorithm: hmac-sha1-etm@openssh.com
algorithm: umac-64-etm@openssh.com
algorithm: umac-128-etm@openssh.com
algorithm: hmac-sha2-256-etm@openssh.com
algorithm: hmac-sha2-512-etm@openssh.com
algorithm: hmac-ripemd160-etm@openssh.com
algorithm: hmac-sha1-96-etm@openssh.com
algorithm: hmac-md5-96-etm@openssh.com
algorithm: hmac-md5
algorithm: hmac-sha1
algorithm: umac-64@openssh.com
algorithm: umac-128@openssh.com
algorithm: hmac-sha2-256
algorithm: hmac-sha2-512
algorithm: hmac-ripemd160
algorithm: hmac-ripemd160@openssh.com
algorithm: hmac-sha1-96
algorithm: hmac-md5-96
--MacCS
MacSC:
algorithm: hmac-md5-etm@openssh.com
algorithm: hmac-sha1-etm@openssh.com
algorithm: umac-64-etm@openssh.com
algorithm: umac-128-etm@openssh.com
algorithm: hmac-sha2-256-etm@openssh.com
algorithm: hmac-sha2-512-etm@openssh.com
algorithm: hmac-ripemd160-etm@openssh.com
algorithm: hmac-sha1-96-etm@openssh.com
algorithm: hmac-md5-96-etm@openssh.com
algorithm: hmac-md5
algorithm: hmac-sha1
algorithm: umac-64@openssh.com
algorithm: umac-128@openssh.com
algorithm: hmac-sha2-256
algorithm: hmac-sha2-512
algorithm: hmac-ripemd160
algorithm: hmac-ripemd160@openssh.com
algorithm: hmac-sha1-96
algorithm: hmac-md5-96
--MacSC
CompCS:
algorithm: none
algorithm: zlib@openssh.com
--CompCS
CompSC:
algorithm: none
algorithm: zlib@openssh.com
--CompSC
ChosenIncomingEncryption: aes256-ctr
ChosenOutgoingEncryptoin: aes256-ctr
ChosenIncomingMac: hmac-sha2-256
ChosenOutgoingMac: hmac-sha2-256
ChosenIncomingCompression: zlib@openssh.com
ChosenOutgoingCompression: zlib@openssh.com
ChosenKexAlgorithm: diffie-hellman-group-exchange-sha256
ChosenHostKeyAlgorithm: ssh-rsa
Received GEX Group.
Using SHA256 for Key Exchange Hash
RSA host key parsed successfully.
Sending newkeys to server...
Expecting newkeys from server...
SSH Key Exchange Success.
installNewKeys:
m_isRekey: 0
Delay compression until after USERAUTH_SUCCESS
No outgoing compression.
No incoming compression.
Outgoing encryption is now AES 256 CTR
outgoingMac: SHA256
--installNewKeys
--sshSetupConnection
socketOptions:
SO_SNDBUF: 262144
SO_RCVBUF: 4194304
TCP_NODELAY: 1
SO_KEEPALIVE: 0
--socketOptions
--connectInner
Success.
--Connect_Ssh
--ChilkatLog

2019-09-16 10:56:57.861 (14492) SSHClientBase::run() - Calling


cleanupTerminalType()
2019-09-16 10:56:57.861 (14492) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-09-16 10:56:57.861 (14492) SSHClientBase::run() - Calling ssh->Disconnect()
2019-09-16 10:56:57.881 (14492) SSHClientBase::run() - Calling ssh->Dispose()
2019-09-16 10:56:57.881 (14492) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-09-16 10:56:57.881 (11576) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-09-16 10:56:59.481 (18500) SSHClientBase::run() gAuthentication = 1
2019-09-16 10:57:00.311 (18500) SSHClient_Pw::authenticate() login name: sent
2019-09-16 10:57:01.931 (18500) SSHClient_Pw::authenticate() received login name:
ts_frutos
2019-09-16 10:57:01.931 (18500) SSHClient_Pw::authenticate() password prompt sent
2019-09-16 10:57:07.511 (18500) SSHClient_Pw::authenticate() password received
2019-09-16 10:57:07.511 (18500) SSHClient_Pw::authenticate() authenticating towards
10.3.16.11
2019-09-16 10:57:07.511 (18500) SSHClient_Pw::authenticate() username: ts_frutos
2019-09-16 10:57:07.511 (18500) SSHClient_Pw::authenticate() length(password): 13
2019-09-16 10:57:07.621 (18500) SSHClient_Pw::authenticate()
get_PasswordChangeRequested() == false
2019-09-16 10:57:07.621 (18500) SSHClientBase::run() authentication successful
2019-09-16 10:57:07.641 (18500) SSHClientBase::run() ssh->OpenSessionChannel()
success, channelNum=0
2019-09-16 10:57:07.651 (18500) SSHClientBase::run() ssh->get_MaxPacketSize(): 2048
2019-09-16 12:06:24.135 (18500) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 0
2019-09-16 12:06:24.135 (18500) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-09-16 12:06:24.135 (18500) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-09-16 12:06:24.135 (18500) SSHClientBase::run() n == 0, this->username:
ts_frutos
2019-09-16 12:06:24.135 (18500) SSHClientBase::run() n == 0, length(newPassword): 0
2019-09-16 12:06:24.135 (18500) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 1
2019-09-16 12:06:24.135 (18500) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-09-16 12:06:24.135 (18500) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-09-16 12:06:24.135 (18500) SSHClientBase::run() n == 0, this->username:
ts_frutos
2019-09-16 12:06:24.135 (18500) SSHClientBase::run() n == 0, length(newPassword): 0
2019-09-16 12:06:24.135 (18500) SSHClientBase::run() - ssh->ChannelReadAndPoll2()
returned -1
2019-09-16 12:06:24.135 (18500) - - - - SSHClientBase::run() ssh->lastErrorText():
ChilkatLog:
ChannelPoll:
ChilkatVersion: 9.5.0.61
This channel already received the EOF.
Sent SSH Channel CLOSE
--ChannelPoll
--ChilkatLog

2019-09-16 12:06:24.135 (18500) SSHClientBase::run() channel is [connected/open]:


[1/0]
2019-09-16 12:06:24.135 (18500) SSHClientBase::run() - Calling
cleanupTerminalType()
2019-09-16 12:06:24.135 (18500) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-09-16 12:06:24.135 (18500) SSHClientBase::run() - Calling ssh->Disconnect()
2019-09-16 12:06:24.198 (18500) SSHClientBase::run() - Calling ssh->Dispose()
2019-09-16 12:06:24.198 (18500) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-09-16 12:06:24.198 (19668) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-09-16 12:06:24.198 (19668) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-09-20 15:00:57.229 (11576) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-09-20 15:00:57.246 (12204) SSHClient_Pw::authenticate() received login name:
2019-09-20 15:00:57.361 (12204) SSHClientBase::run() failed to authenticate ssh-
>lastErrorText(): ChilkatLog:
Connect_Ssh:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
connectInner:
hostname: 10.3.22.168
port: 4422
sshConnect:
Established TCP/IP connection with SSH server
--sshConnect
sshSetupConnection:
clientIdentifier: SSH-2.0-PuTTY_Release_0.66
Sending client identifier...
Done sending client identifier.
Reading server version...
initialDataFromSshServer: SSH-2.0-OpenSSH_6.6.1

serverVersion: SSH-2.0-OpenSSH_6.6.1
KeyExchangeAlgs:
algorithm: curve25519-sha256@libssh.org
algorithm: ecdh-sha2-nistp256
algorithm: ecdh-sha2-nistp384
algorithm: ecdh-sha2-nistp521
algorithm: diffie-hellman-group-exchange-sha256
algorithm: diffie-hellman-group-exchange-sha1
algorithm: diffie-hellman-group14-sha1
algorithm: diffie-hellman-group1-sha1
--KeyExchangeAlgs
HostKeyAlgs:
algorithm: ssh-rsa
algorithm: ssh-dss
algorithm: ecdsa-sha2-nistp256
algorithm: ssh-ed25519
--HostKeyAlgs
EncCS:
algorithm: aes128-ctr
algorithm: aes256-ctr
algorithm: arcfour256
algorithm: arcfour
algorithm: aes128-cbc
algorithm: aes256-cbc
--EncCS
EncSC:
algorithm: aes128-ctr
algorithm: aes256-ctr
algorithm: arcfour256
algorithm: arcfour
algorithm: aes128-cbc
algorithm: aes256-cbc
--EncSC
MacCS:
algorithm: hmac-md5-etm@openssh.com
algorithm: hmac-sha1-etm@openssh.com
algorithm: umac-64-etm@openssh.com
algorithm: umac-128-etm@openssh.com
algorithm: hmac-sha2-256-etm@openssh.com
algorithm: hmac-sha2-512-etm@openssh.com
algorithm: hmac-ripemd160-etm@openssh.com
algorithm: hmac-sha1-96-etm@openssh.com
algorithm: hmac-md5-96-etm@openssh.com
algorithm: hmac-md5
algorithm: hmac-sha1
algorithm: umac-64@openssh.com
algorithm: umac-128@openssh.com
algorithm: hmac-sha2-256
algorithm: hmac-sha2-512
algorithm: hmac-ripemd160
algorithm: hmac-ripemd160@openssh.com
algorithm: hmac-sha1-96
algorithm: hmac-md5-96
--MacCS
MacSC:
algorithm: hmac-md5-etm@openssh.com
algorithm: hmac-sha1-etm@openssh.com
algorithm: umac-64-etm@openssh.com
algorithm: umac-128-etm@openssh.com
algorithm: hmac-sha2-256-etm@openssh.com
algorithm: hmac-sha2-512-etm@openssh.com
algorithm: hmac-ripemd160-etm@openssh.com
algorithm: hmac-sha1-96-etm@openssh.com
algorithm: hmac-md5-96-etm@openssh.com
algorithm: hmac-md5
algorithm: hmac-sha1
algorithm: umac-64@openssh.com
algorithm: umac-128@openssh.com
algorithm: hmac-sha2-256
algorithm: hmac-sha2-512
algorithm: hmac-ripemd160
algorithm: hmac-ripemd160@openssh.com
algorithm: hmac-sha1-96
algorithm: hmac-md5-96
--MacSC
CompCS:
algorithm: none
algorithm: zlib@openssh.com
--CompCS
CompSC:
algorithm: none
algorithm: zlib@openssh.com
--CompSC
ChosenIncomingEncryption: aes256-ctr
ChosenOutgoingEncryptoin: aes256-ctr
ChosenIncomingMac: hmac-sha2-256
ChosenOutgoingMac: hmac-sha2-256
ChosenIncomingCompression: zlib@openssh.com
ChosenOutgoingCompression: zlib@openssh.com
ChosenKexAlgorithm: diffie-hellman-group-exchange-sha256
ChosenHostKeyAlgorithm: ssh-rsa
Received GEX Group.
Using SHA256 for Key Exchange Hash
RSA host key parsed successfully.
Sending newkeys to server...
Expecting newkeys from server...
SSH Key Exchange Success.
installNewKeys:
m_isRekey: 0
Delay compression until after USERAUTH_SUCCESS
No outgoing compression.
No incoming compression.
Outgoing encryption is now AES 256 CTR
outgoingMac: SHA256
--installNewKeys
--sshSetupConnection
socketOptions:
SO_SNDBUF: 262144
SO_RCVBUF: 4194304
TCP_NODELAY: 1
SO_KEEPALIVE: 0
--socketOptions
--connectInner
Success.
--Connect_Ssh
--ChilkatLog

2019-09-20 15:00:57.376 (12204) SSHClientBase::run() - Calling


cleanupTerminalType()
2019-09-20 15:00:57.376 (12204) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-09-20 15:00:57.392 (12204) SSHClientBase::run() - Calling ssh->Disconnect()
2019-09-20 15:00:57.423 (12204) SSHClientBase::run() - Calling ssh->Dispose()
2019-09-20 15:00:57.423 (12204) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-09-20 15:00:57.492 (11576) SshLogFile::~SshLogFile() - Destroying object
2019-09-23 16:06:27.942 (32852) SSHClientBase::run() gAuthentication = 1
2019-09-23 16:06:28.421 (32852) SSHClient_Pw::authenticate() login name: sent
2019-09-30 11:32:38.572 (58508) SSHClientBase::run() gAuthentication = 1
2019-09-30 11:32:38.930 (58508) SSHClient_Pw::authenticate() login name: sent
2019-09-30 11:32:43.980 (58508) SSHClient_Pw::authenticate() received login name:
ts_frutos
2019-09-30 11:32:43.980 (58508) SSHClient_Pw::authenticate() password prompt sent
2019-09-30 11:32:47.354 (58508) SSHClient_Pw::authenticate() password received
2019-09-30 11:32:47.354 (58508) SSHClient_Pw::authenticate() authenticating towards
10.3.6.5
2019-09-30 11:32:47.354 (58508) SSHClient_Pw::authenticate() username: ts_frutos
2019-09-30 11:32:47.354 (58508) SSHClient_Pw::authenticate() length(password): 10
2019-09-30 11:32:52.692 (58508) SSHClient_Pw::authenticate() AuthenticatePw()
failed ssh->lastErrorText(): ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
passwordAuth:
Sent login/password
Authentication failed or partial success. (1)
PartialSuccess1: 0
AuthList: publickey,password,keyboard-interactive
important:
This is likely a simple invalid login and/or password error,
meaning your application did not send the correct login and/or password.
--important
--passwordAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-09-30 11:32:52.692 (58508) SSHClient_Pw::authenticate()


get_PasswordChangeRequested() == false
2019-09-30 11:32:52.692 (58508) SSHClient_Pw::authenticate() is connected,
authentication failure towards 10.3.6.5
ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
Connected.
--IsConnected
--ChilkatLog

2019-09-30 11:32:52.692 (58508) SSHClient_Pw::retryAuthenticate() password prompt


sent
2019-09-30 11:33:19.209 (56536) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-09-30 11:33:19.225 (58508) SSHClient_Pw::retryAuthenticate() password received
2019-09-30 11:33:19.225 (58508) SSHClient_Pw::retryAuthenticate() authenticating
towards 10.3.6.5
2019-09-30 11:33:24.659 (58508) SSHClient_Pw::authenticate() authentication failure
towards 10.3.6.5
2019-09-30 11:33:24.659 (58508) SSHClient_Pw::authenticate() ssh->lastErrorText():
ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
sshAuthenticatePw:
requestUserAuthService:
sendServiceRequest:
svcName: ssh-userauth
SentServiceReq: ssh-userauth
--sendServiceRequest
ssh-userauth service accepted.
--requestUserAuthService
AuthMethods: publickey,password,keyboard-interactive
Password is empty. Choosing keyboard-interactive login instead.
keyboardInteractiveAuth:
Sent keyboard-interactive request
userAuthInfoRequest:
parseUserAuthInfoRequest:
name:
instruction:
language:
numPrompts: 1
prompt:
********************************************************************************
IF YOU ARE NOT AN AUTHORIZED USER, PLEASE EXIT IMMEDIATELY.
********************************************************************************
Password:
echo: 0
--parseUserAuthInfoRequest
Sending password...
sshKeyboardInteractive:
Sent keyboard-interactive response.
userAuthNonSuccess:
partialSuccess: 0
authList: publickey,password,keyboard-interactive
--userAuthNonSuccess
--sshKeyboardInteractive
keyboard-interactive authentication failed (A)
--userAuthInfoRequest
--keyboardInteractiveAuth
--sshAuthenticatePw
Failed.
--AuthenticatePw
--ChilkatLog

2019-09-30 11:33:24.659 (58508) SSHClientBase::run() failed to authenticate ssh-


>lastErrorText(): ChilkatLog:
IsConnected:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
Connected.
--IsConnected
--ChilkatLog

2019-09-30 11:33:24.659 (58508) SSHClientBase::run() - Calling


cleanupTerminalType()
2019-09-30 11:33:24.659 (58508) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-09-30 11:33:24.659 (58508) SSHClientBase::run() - Calling ssh->Disconnect()
2019-09-30 11:33:24.681 (58508) SSHClientBase::run() - Calling ssh->Dispose()
2019-09-30 11:33:24.681 (58508) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-09-30 11:33:24.681 (56536) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-09-30 11:33:26.031 (69392) SSHClientBase::run() gAuthentication = 1
2019-09-30 11:33:26.400 (69392) SSHClient_Pw::authenticate() login name: sent
2019-09-30 11:33:28.754 (69392) SSHClient_Pw::authenticate() received login name:
tsadmin
2019-09-30 11:33:28.754 (69392) SSHClient_Pw::authenticate() password prompt sent
2019-09-30 11:33:35.042 (69392) SSHClient_Pw::authenticate() password received
2019-09-30 11:33:35.042 (69392) SSHClient_Pw::authenticate() authenticating towards
10.3.6.5
2019-09-30 11:33:35.042 (69392) SSHClient_Pw::authenticate() username: tsadmin
2019-09-30 11:33:35.042 (69392) SSHClient_Pw::authenticate() length(password): 16
2019-09-30 11:33:35.374 (69392) SSHClient_Pw::authenticate()
get_PasswordChangeRequested() == false
2019-09-30 11:33:35.374 (69392) SSHClientBase::run() authentication successful
2019-09-30 11:33:35.396 (69392) SSHClientBase::run() ssh->OpenSessionChannel()
success, channelNum=0
2019-09-30 11:33:35.411 (69392) SSHClientBase::run() ssh->get_MaxPacketSize(): 2048
2019-09-30 11:34:12.223 (69392) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 1
2019-09-30 11:34:12.223 (69392) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-09-30 11:34:12.223 (69392) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-09-30 11:34:12.223 (69392) SSHClientBase::run() n == 0, this->username:
tsadmin
2019-09-30 11:34:12.223 (69392) SSHClientBase::run() n == 0, length(newPassword):
13
2019-09-30 11:34:12.223 (69392) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 1
2019-09-30 11:34:12.223 (69392) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-09-30 11:34:12.223 (69392) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-09-30 11:34:12.223 (69392) SSHClientBase::run() n == 0, this->username:
tsadmin
2019-09-30 11:34:12.223 (69392) SSHClientBase::run() n == 0, length(newPassword):
13
2019-09-30 11:34:12.223 (69392) SSHClientBase::run() - ssh->ChannelReadAndPoll2()
returned -1
2019-09-30 11:34:12.223 (69392) - - - - SSHClientBase::run() ssh->lastErrorText():
ChilkatLog:
ChannelPoll:
ChilkatVersion: 9.5.0.61
This channel already received the EOF.
Sent SSH Channel CLOSE
--ChannelPoll
--ChilkatLog

2019-09-30 11:34:12.223 (69392) SSHClientBase::run() channel is [connected/open]:


[1/0]
2019-09-30 11:34:12.223 (69392) SSHClientBase::run() - Calling
cleanupTerminalType()
2019-09-30 11:34:12.223 (69392) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-09-30 11:34:12.223 (69392) SSHClientBase::run() - Calling ssh->Disconnect()
2019-09-30 11:34:12.254 (69392) SSHClientBase::run() - Calling ssh->Dispose()
2019-09-30 11:34:12.254 (69392) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-09-30 11:34:12.254 (86176) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-09-30 11:34:12.254 (86176) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-09-30 11:34:14.593 (95464) SSHClientBase::run() gAuthentication = 1
2019-09-30 11:34:14.978 (95464) SSHClient_Pw::authenticate() login name: sent
2019-09-30 11:34:18.421 (95464) SSHClient_Pw::authenticate() received login name:
ts_frutos
2019-09-30 11:34:18.421 (95464) SSHClient_Pw::authenticate() password prompt sent
2019-09-30 11:34:22.518 (95464) SSHClient_Pw::authenticate() password received
2019-09-30 11:34:22.518 (95464) SSHClient_Pw::authenticate() authenticating towards
10.3.6.5
2019-09-30 11:34:22.518 (95464) SSHClient_Pw::authenticate() username: ts_frutos
2019-09-30 11:34:22.518 (95464) SSHClient_Pw::authenticate() length(password): 13
2019-09-30 11:34:22.603 (95464) SSHClient_Pw::authenticate()
get_PasswordChangeRequested() == false
2019-09-30 11:34:22.603 (95464) SSHClientBase::run() authentication successful
2019-09-30 11:34:22.634 (95464) SSHClientBase::run() ssh->OpenSessionChannel()
success, channelNum=0
2019-09-30 11:34:22.641 (95464) SSHClientBase::run() ssh->get_MaxPacketSize(): 2048
2019-09-30 11:34:37.934 (95464) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 1
2019-09-30 11:34:37.934 (95464) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-09-30 11:34:37.934 (95464) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-09-30 11:34:37.934 (95464) SSHClientBase::run() n == 0, this->username:
ts_frutos
2019-09-30 11:34:37.934 (95464) SSHClientBase::run() n == 0, length(newPassword):
11
2019-09-30 11:34:37.934 (95464) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 1
2019-09-30 11:34:37.934 (95464) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-09-30 11:34:37.934 (95464) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-09-30 11:34:37.934 (95464) SSHClientBase::run() n == 0, this->username:
ts_frutos
2019-09-30 11:34:37.934 (95464) SSHClientBase::run() n == 0, length(newPassword):
11
2019-09-30 11:34:37.934 (95464) SSHClientBase::run() - ssh->ChannelReadAndPoll2()
returned -1
2019-09-30 11:34:37.934 (95464) - - - - SSHClientBase::run() ssh->lastErrorText():
ChilkatLog:
ChannelPoll:
ChilkatVersion: 9.5.0.61
This channel already received the EOF.
Sent SSH Channel CLOSE
--ChannelPoll
--ChilkatLog

2019-09-30 11:34:37.934 (95464) SSHClientBase::run() channel is [connected/open]:


[1/0]
2019-09-30 11:34:37.934 (95464) SSHClientBase::run() - newPasswordReceived, Calling
ssh->ChannelSendClose()
2019-09-30 11:34:37.934 (95464) SSHClientBase::run() - newPasswordReceived, Calling
ssh->Disconnect()
2019-09-30 11:34:37.950 (95464) SSHClientBase::run() - newPasswordReceived, Calling
ssh->Dispose()
2019-09-30 11:34:37.950 (95464) SSHClientBase::run() gAuthentication = 1
2019-09-30 11:34:38.420 (95464) SSHClientBase::run() authentication successful
2019-09-30 11:34:38.420 (95464) SSHClientBase::run() ssh->OpenSessionChannel()
success, channelNum=0
2019-09-30 11:34:38.435 (95464) SSHClientBase::run() ssh->get_MaxPacketSize(): 2048
2019-09-30 12:04:38.672 (95464) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 0
2019-09-30 12:04:38.672 (95464) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-09-30 12:04:38.672 (95464) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-09-30 12:04:38.672 (95464) SSHClientBase::run() n == 0, this->username:
ts_frutos
2019-09-30 12:04:38.672 (95464) SSHClientBase::run() n == 0, length(newPassword):
11
2019-09-30 12:04:38.672 (95464) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 1
2019-09-30 12:04:38.672 (95464) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-09-30 12:04:38.672 (95464) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-09-30 12:04:38.672 (95464) SSHClientBase::run() n == 0, this->username:
ts_frutos
2019-09-30 12:04:38.672 (95464) SSHClientBase::run() n == 0, length(newPassword):
11
2019-09-30 12:04:38.672 (95464) SSHClientBase::run() - ssh->ChannelReadAndPoll2()
returned -1
2019-09-30 12:04:38.672 (95464) - - - - SSHClientBase::run() ssh->lastErrorText():
ChilkatLog:
ChannelPoll:
ChilkatVersion: 9.5.0.61
This channel already received the EOF.
Sent SSH Channel CLOSE
--ChannelPoll
--ChilkatLog

2019-09-30 12:04:38.672 (95464) SSHClientBase::run() channel is [connected/open]:


[1/0]
2019-09-30 12:04:38.672 (95464) SSHClientBase::run() - Calling
cleanupTerminalType()
2019-09-30 12:04:38.672 (95464) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-09-30 12:04:38.672 (95464) SSHClientBase::run() - Calling ssh->Disconnect()
2019-09-30 12:04:38.688 (95464) SSHClientBase::run() - Calling ssh->Dispose()
2019-09-30 12:04:38.688 (95464) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-09-30 12:04:38.688 (50248) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-09-30 12:04:38.688 (50248) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-10-02 15:37:58.937 (108120) SSHClientBase::run() gAuthentication = 1
2019-10-02 15:37:59.432 (108120) SSHClient_Pw::authenticate() login name: sent
2019-10-02 15:38:01.565 (108120) SSHClient_Pw::authenticate() received login name:
ts_frutos
2019-10-02 15:38:01.565 (108120) SSHClient_Pw::authenticate() password prompt sent
2019-10-02 15:38:17.345 (108120) SSHClient_Pw::authenticate() password received
2019-10-02 15:38:17.345 (108120) SSHClient_Pw::authenticate() authenticating
towards 10.3.6.5
2019-10-02 15:38:17.345 (108120) SSHClient_Pw::authenticate() username: ts_frutos
2019-10-02 15:38:17.345 (108120) SSHClient_Pw::authenticate() length(password): 11
2019-10-02 15:38:17.438 (108120) SSHClient_Pw::authenticate()
get_PasswordChangeRequested() == false
2019-10-02 15:38:17.439 (108120) SSHClientBase::run() authentication successful
2019-10-02 15:38:17.451 (108120) SSHClientBase::run() ssh->OpenSessionChannel()
success, channelNum=0
2019-10-02 15:38:17.474 (108120) SSHClientBase::run() ssh->get_MaxPacketSize():
2048
2019-10-02 16:07:46.448 (56536) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-10-02 16:07:46.449 (108120) SSHClientBase::run() - thread stop has been
requested
2019-10-02 16:07:46.449 (108120) SSHClientBase::run() - Calling
cleanupTerminalType()
2019-10-02 16:07:46.449 (108120) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-10-02 16:07:46.449 (108120) SSHClientBase::run() - Calling ssh->Disconnect()
2019-10-02 16:07:46.457 (108120) SSHClientBase::run() - Calling ssh->Dispose()
2019-10-02 16:07:46.457 (108120) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-10-02 16:07:46.459 (56536) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-10-02 16:07:47.855 (44816) SSHClientBase::run() gAuthentication = 1
2019-10-02 16:07:48.558 (44816) SSHClient_Pw::authenticate() login name: sent
2019-10-02 16:07:50.641 (44816) SSHClient_Pw::authenticate() received login name:
ts_frutos
2019-10-02 16:07:50.641 (44816) SSHClient_Pw::authenticate() password prompt sent
2019-10-02 16:07:55.312 (44816) SSHClient_Pw::authenticate() password received
2019-10-02 16:07:55.312 (44816) SSHClient_Pw::authenticate() authenticating towards
10.3.6.5
2019-10-02 16:07:55.312 (44816) SSHClient_Pw::authenticate() username: ts_frutos
2019-10-02 16:07:55.312 (44816) SSHClient_Pw::authenticate() length(password): 11
2019-10-02 16:07:55.413 (44816) SSHClient_Pw::authenticate()
get_PasswordChangeRequested() == false
2019-10-02 16:07:55.413 (44816) SSHClientBase::run() authentication successful
2019-10-02 16:07:55.424 (44816) SSHClientBase::run() ssh->OpenSessionChannel()
success, channelNum=0
2019-10-02 16:07:55.439 (44816) SSHClientBase::run() ssh->get_MaxPacketSize(): 2048
2019-10-02 16:12:11.163 (56536) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-10-02 16:12:11.206 (32852) SSHClient_Pw::authenticate() received login name:
2019-10-02 16:12:11.206 (32852) SSHClientBase::run() failed to authenticate ssh-
>lastErrorText(): ChilkatLog:
Connect_Ssh:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
connectInner:
hostname: 10.3.22.168
port: 4422
sshConnect:
Established TCP/IP connection with SSH server
--sshConnect
sshSetupConnection:
clientIdentifier: SSH-2.0-PuTTY_Release_0.66
Sending client identifier...
Done sending client identifier.
Reading server version...
initialDataFromSshServer: SSH-2.0-OpenSSH_6.6.1

serverVersion: SSH-2.0-OpenSSH_6.6.1
KeyExchangeAlgs:
algorithm: curve25519-sha256@libssh.org
algorithm: ecdh-sha2-nistp256
algorithm: ecdh-sha2-nistp384
algorithm: ecdh-sha2-nistp521
algorithm: diffie-hellman-group-exchange-sha256
algorithm: diffie-hellman-group-exchange-sha1
algorithm: diffie-hellman-group14-sha1
algorithm: diffie-hellman-group1-sha1
--KeyExchangeAlgs
HostKeyAlgs:
algorithm: ssh-rsa
algorithm: ssh-dss
algorithm: ecdsa-sha2-nistp256
algorithm: ssh-ed25519
--HostKeyAlgs
EncCS:
algorithm: aes128-ctr
algorithm: aes256-ctr
algorithm: arcfour256
algorithm: arcfour
algorithm: aes128-cbc
algorithm: aes256-cbc
--EncCS
EncSC:
algorithm: aes128-ctr
algorithm: aes256-ctr
algorithm: arcfour256
algorithm: arcfour
algorithm: aes128-cbc
algorithm: aes256-cbc
--EncSC
MacCS:
algorithm: hmac-md5-etm@openssh.com
algorithm: hmac-sha1-etm@openssh.com
algorithm: umac-64-etm@openssh.com
algorithm: umac-128-etm@openssh.com
algorithm: hmac-sha2-256-etm@openssh.com
algorithm: hmac-sha2-512-etm@openssh.com
algorithm: hmac-ripemd160-etm@openssh.com
algorithm: hmac-sha1-96-etm@openssh.com
algorithm: hmac-md5-96-etm@openssh.com
algorithm: hmac-md5
algorithm: hmac-sha1
algorithm: umac-64@openssh.com
algorithm: umac-128@openssh.com
algorithm: hmac-sha2-256
algorithm: hmac-sha2-512
algorithm: hmac-ripemd160
algorithm: hmac-ripemd160@openssh.com
algorithm: hmac-sha1-96
algorithm: hmac-md5-96
--MacCS
MacSC:
algorithm: hmac-md5-etm@openssh.com
algorithm: hmac-sha1-etm@openssh.com
algorithm: umac-64-etm@openssh.com
algorithm: umac-128-etm@openssh.com
algorithm: hmac-sha2-256-etm@openssh.com
algorithm: hmac-sha2-512-etm@openssh.com
algorithm: hmac-ripemd160-etm@openssh.com
algorithm: hmac-sha1-96-etm@openssh.com
algorithm: hmac-md5-96-etm@openssh.com
algorithm: hmac-md5
algorithm: hmac-sha1
algorithm: umac-64@openssh.com
algorithm: umac-128@openssh.com
algorithm: hmac-sha2-256
algorithm: hmac-sha2-512
algorithm: hmac-ripemd160
algorithm: hmac-ripemd160@openssh.com
algorithm: hmac-sha1-96
algorithm: hmac-md5-96
--MacSC
CompCS:
algorithm: none
algorithm: zlib@openssh.com
--CompCS
CompSC:
algorithm: none
algorithm: zlib@openssh.com
--CompSC
ChosenIncomingEncryption: aes256-ctr
ChosenOutgoingEncryptoin: aes256-ctr
ChosenIncomingMac: hmac-sha2-256
ChosenOutgoingMac: hmac-sha2-256
ChosenIncomingCompression: zlib@openssh.com
ChosenOutgoingCompression: zlib@openssh.com
ChosenKexAlgorithm: diffie-hellman-group-exchange-sha256
ChosenHostKeyAlgorithm: ssh-rsa
Received GEX Group.
Using SHA256 for Key Exchange Hash
RSA host key parsed successfully.
Sending newkeys to server...
Expecting newkeys from server...
SSH Key Exchange Success.
installNewKeys:
m_isRekey: 0
Delay compression until after USERAUTH_SUCCESS
No outgoing compression.
No incoming compression.
Outgoing encryption is now AES 256 CTR
outgoingMac: SHA256
--installNewKeys
--sshSetupConnection
socketOptions:
SO_SNDBUF: 262144
SO_RCVBUF: 4194304
TCP_NODELAY: 1
SO_KEEPALIVE: 0
--socketOptions
--connectInner
Success.
--Connect_Ssh
--ChilkatLog

2019-10-02 16:12:11.206 (32852) SSHClientBase::run() - Calling


cleanupTerminalType()
2019-10-02 16:12:11.206 (32852) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-10-02 16:12:11.227 (32852) SSHClientBase::run() - Calling ssh->Disconnect()
2019-10-02 16:12:11.227 (32852) SSHClientBase::run() - Calling ssh->Dispose()
2019-10-02 16:12:11.227 (32852) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-10-02 16:12:11.242 (56536) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-10-02 16:12:12.278 (111304) SSHClientBase::run() gAuthentication = 1
2019-10-02 16:12:12.818 (111304) SSHClient_Pw::authenticate() login name: sent
2019-10-02 16:12:47.516 (111304) SSHClient_Pw::authenticate() received login name:
tsadmin
2019-10-02 16:12:47.516 (111304) SSHClient_Pw::authenticate() password prompt sent
2019-10-02 16:12:51.176 (111304) SSHClient_Pw::authenticate() password received
2019-10-02 16:12:51.176 (111304) SSHClient_Pw::authenticate() authenticating
towards 10.3.22.168
2019-10-02 16:12:51.176 (111304) SSHClient_Pw::authenticate() username: tsadmin
2019-10-02 16:12:51.176 (111304) SSHClient_Pw::authenticate() length(password): 11
2019-10-02 16:12:51.596 (111304) SSHClient_Pw::authenticate()
get_PasswordChangeRequested() == false
2019-10-02 16:12:51.596 (111304) SSHClientBase::run() authentication successful
2019-10-02 16:12:51.606 (111304) SSHClientBase::run() ssh->OpenSessionChannel()
success, channelNum=0
2019-10-02 16:12:51.656 (111304) SSHClientBase::run() ssh->get_MaxPacketSize():
2048
2019-10-02 16:13:35.386 (56536) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-10-02 16:13:35.394 (111304) SSHClientBase::run() - thread stop has been
requested
2019-10-02 16:13:35.394 (111304) SSHClientBase::run() - Calling
cleanupTerminalType()
2019-10-02 16:13:35.394 (111304) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-10-02 16:13:35.394 (111304) SSHClientBase::run() - Calling ssh->Disconnect()
2019-10-02 16:13:35.416 (111304) SSHClientBase::run() - Calling ssh->Dispose()
2019-10-02 16:13:35.416 (111304) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-10-02 16:13:35.416 (56536) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-10-02 16:13:36.805 (82700) SSHClientBase::run() gAuthentication = 1
2019-10-02 16:13:37.250 (82700) SSHClient_Pw::authenticate() login name: sent
2019-10-02 16:13:42.266 (82700) SSHClient_Pw::authenticate() received login name:
ts_frutos
2019-10-02 16:13:42.266 (82700) SSHClient_Pw::authenticate() password prompt sent
2019-10-02 16:13:50.066 (82700) SSHClient_Pw::authenticate() password received
2019-10-02 16:13:50.066 (82700) SSHClient_Pw::authenticate() authenticating towards
10.3.22.168
2019-10-02 16:13:50.066 (82700) SSHClient_Pw::authenticate() username: ts_frutos
2019-10-02 16:13:50.066 (82700) SSHClient_Pw::authenticate() length(password): 13
2019-10-02 16:13:50.199 (82700) SSHClient_Pw::authenticate()
get_PasswordChangeRequested() == false
2019-10-02 16:13:50.199 (82700) SSHClientBase::run() authentication successful
2019-10-02 16:13:50.216 (82700) SSHClientBase::run() ssh->OpenSessionChannel()
success, channelNum=0
2019-10-02 16:13:50.230 (82700) SSHClientBase::run() ssh->get_MaxPacketSize(): 2048
2019-10-02 16:14:02.066 (82700) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 0
2019-10-02 16:14:02.066 (82700) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-10-02 16:14:02.066 (82700) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-10-02 16:14:02.066 (82700) SSHClientBase::run() n == 0, this->username:
ts_frutos
2019-10-02 16:14:02.066 (82700) SSHClientBase::run() n == 0, length(newPassword):
11
2019-10-02 16:14:02.066 (82700) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 1
2019-10-02 16:14:02.066 (82700) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-10-02 16:14:02.066 (82700) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-10-02 16:14:02.066 (82700) SSHClientBase::run() n == 0, this->username:
ts_frutos
2019-10-02 16:14:02.066 (82700) SSHClientBase::run() n == 0, length(newPassword):
11
2019-10-02 16:14:02.076 (82700) SSHClientBase::run() n == 0, passwordChanged forced
to true
2019-10-02 16:14:02.076 (82700) SSHClientBase::run() - ssh->ChannelReadAndPoll2()
returned -1
2019-10-02 16:14:02.076 (82700) - - - - SSHClientBase::run() ssh->lastErrorText():
ChilkatLog:
ChannelPoll:
ChilkatVersion: 9.5.0.61
This channel already received the EOF.
Sent SSH Channel CLOSE
--ChannelPoll
--ChilkatLog

2019-10-02 16:14:02.076 (82700) SSHClientBase::run() channel is [connected/open]:


[1/0]
2019-10-02 16:14:02.076 (82700) SSHClientBase::run() - newPasswordReceived, Calling
ssh->ChannelSendClose()
2019-10-02 16:14:02.076 (82700) SSHClientBase::run() - newPasswordReceived, Calling
ssh->Disconnect()
2019-10-02 16:14:02.079 (82700) SSHClientBase::run() - newPasswordReceived, Calling
ssh->Dispose()
2019-10-02 16:14:02.079 (82700) SSHClientBase::run() gAuthentication = 1
2019-10-02 16:14:02.650 (82700) SSHClientBase::run() authentication successful
2019-10-02 16:14:02.656 (82700) SSHClientBase::run() ssh->OpenSessionChannel()
success, channelNum=0
2019-10-02 16:14:02.666 (82700) SSHClientBase::run() ssh->get_MaxPacketSize(): 2048
2019-10-02 16:14:48.286 (42104) SSHClientBase::run() gAuthentication = 1
2019-10-02 16:14:48.906 (42104) SSHClient_Pw::authenticate() login name: sent
2019-10-02 16:14:51.796 (42104) SSHClient_Pw::authenticate() received login name:
tsadmin
2019-10-02 16:14:51.796 (42104) SSHClient_Pw::authenticate() password prompt sent
2019-10-02 16:15:13.086 (42104) SSHClient_Pw::authenticate() password received
2019-10-02 16:15:13.086 (42104) SSHClient_Pw::authenticate() authenticating towards
10.3.16.11
2019-10-02 16:15:13.086 (42104) SSHClient_Pw::authenticate() username: tsadmin
2019-10-02 16:15:13.086 (42104) SSHClient_Pw::authenticate() length(password): 16
2019-10-02 16:15:13.586 (42104) SSHClient_Pw::authenticate()
get_PasswordChangeRequested() == false
2019-10-02 16:15:13.586 (42104) SSHClientBase::run() authentication successful
2019-10-02 16:15:13.606 (42104) SSHClientBase::run() ssh->OpenSessionChannel()
success, channelNum=0
2019-10-02 16:15:13.606 (42104) SSHClientBase::run() ssh->get_MaxPacketSize(): 2048
2019-10-02 16:16:04.716 (56536) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-10-02 16:16:04.726 (42104) SSHClientBase::run() - thread stop has been
requested
2019-10-02 16:16:04.726 (42104) SSHClientBase::run() - Calling
cleanupTerminalType()
2019-10-02 16:16:04.726 (42104) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-10-02 16:16:04.726 (42104) SSHClientBase::run() - Calling ssh->Disconnect()
2019-10-02 16:16:04.748 (42104) SSHClientBase::run() - Calling ssh->Dispose()
2019-10-02 16:16:04.748 (42104) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-10-02 16:16:04.748 (56536) SshLogFile::~SshLogFile() - there are 2 remaining
users
2019-10-02 16:16:06.036 (59804) SSHClientBase::run() gAuthentication = 1
2019-10-02 16:16:06.466 (59804) SSHClient_Pw::authenticate() login name: sent
2019-10-02 16:16:10.336 (59804) SSHClient_Pw::authenticate() received login name:
ts_frutos
2019-10-02 16:16:10.336 (59804) SSHClient_Pw::authenticate() password prompt sent
2019-10-02 16:16:17.706 (59804) SSHClient_Pw::authenticate() password received
2019-10-02 16:16:17.706 (59804) SSHClient_Pw::authenticate() authenticating towards
10.3.16.11
2019-10-02 16:16:17.706 (59804) SSHClient_Pw::authenticate() username: ts_frutos
2019-10-02 16:16:17.706 (59804) SSHClient_Pw::authenticate() length(password): 13
2019-10-02 16:16:17.796 (59804) SSHClient_Pw::authenticate()
get_PasswordChangeRequested() == false
2019-10-02 16:16:17.796 (59804) SSHClientBase::run() authentication successful
2019-10-02 16:16:17.816 (59804) SSHClientBase::run() ssh->OpenSessionChannel()
success, channelNum=0
2019-10-02 16:16:17.826 (59804) SSHClientBase::run() ssh->get_MaxPacketSize(): 2048
2019-10-02 16:16:30.116 (59804) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 1
2019-10-02 16:16:30.116 (59804) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-10-02 16:16:30.116 (59804) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-10-02 16:16:30.116 (59804) SSHClientBase::run() n == 0, this->username:
ts_frutos
2019-10-02 16:16:30.116 (59804) SSHClientBase::run() n == 0, length(newPassword): 0
2019-10-02 16:16:30.116 (59804) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 1
2019-10-02 16:16:30.116 (59804) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-10-02 16:16:30.116 (59804) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-10-02 16:16:30.116 (59804) SSHClientBase::run() n == 0, this->username:
ts_frutos
2019-10-02 16:16:30.116 (59804) SSHClientBase::run() n == 0, length(newPassword): 0
2019-10-02 16:16:30.116 (59804) SSHClientBase::run() - ssh->ChannelReadAndPoll2()
returned -1
2019-10-02 16:16:30.116 (59804) - - - - SSHClientBase::run() ssh->lastErrorText():
ChilkatLog:
ChannelPoll:
ChilkatVersion: 9.5.0.61
This channel already received the EOF.
Sent SSH Channel CLOSE
--ChannelPoll
--ChilkatLog

2019-10-02 16:16:30.116 (59804) SSHClientBase::run() channel is [connected/open]:


[1/0]
2019-10-02 16:16:30.116 (59804) SSHClientBase::run() - Calling
cleanupTerminalType()
2019-10-02 16:16:30.116 (59804) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-10-02 16:16:30.116 (59804) SSHClientBase::run() - Calling ssh->Disconnect()
2019-10-02 16:16:30.126 (59804) SSHClientBase::run() - Calling ssh->Dispose()
2019-10-02 16:16:30.126 (59804) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-10-02 16:16:30.126 (103616) SSHClientBase::stop() called, thread is expected
to stop shortly
2019-10-02 16:16:30.126 (103616) SshLogFile::~SshLogFile() - there are 2 remaining
users
2019-10-02 16:16:31.296 (66688) SSHClientBase::run() gAuthentication = 1
2019-10-02 16:16:31.956 (66688) SSHClient_Pw::authenticate() login name: sent
2019-10-02 16:16:33.346 (66688) SSHClient_Pw::authenticate() received login name:
ts_frutos
2019-10-02 16:16:33.346 (66688) SSHClient_Pw::authenticate() password prompt sent
2019-10-02 16:16:36.846 (66688) SSHClient_Pw::authenticate() password received
2019-10-02 16:16:36.846 (66688) SSHClient_Pw::authenticate() authenticating towards
10.3.16.11
2019-10-02 16:16:36.846 (66688) SSHClient_Pw::authenticate() username: ts_frutos
2019-10-02 16:16:36.846 (66688) SSHClient_Pw::authenticate() length(password): 11
2019-10-02 16:16:36.956 (66688) SSHClient_Pw::authenticate()
get_PasswordChangeRequested() == false
2019-10-02 16:16:36.956 (66688) SSHClientBase::run() authentication successful
2019-10-02 16:16:36.986 (66688) SSHClientBase::run() ssh->OpenSessionChannel()
success, channelNum=0
2019-10-02 16:16:36.986 (66688) SSHClientBase::run() ssh->get_MaxPacketSize(): 2048
2019-10-02 17:44:06.400 (44816) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 0
2019-10-02 17:44:06.400 (44816) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-10-02 17:44:06.400 (44816) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-10-02 17:44:06.400 (44816) SSHClientBase::run() n == 0, this->username:
ts_frutos
2019-10-02 17:44:06.400 (44816) SSHClientBase::run() n == 0, length(newPassword): 0
2019-10-02 17:44:06.400 (44816) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 1
2019-10-02 17:44:06.400 (44816) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-10-02 17:44:06.400 (44816) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-10-02 17:44:06.400 (44816) SSHClientBase::run() n == 0, this->username:
ts_frutos
2019-10-02 17:44:06.400 (44816) SSHClientBase::run() n == 0, length(newPassword): 0
2019-10-02 17:44:06.420 (44816) SSHClientBase::run() - ssh->ChannelReadAndPoll2()
returned -1
2019-10-02 17:44:06.420 (44816) - - - - SSHClientBase::run() ssh->lastErrorText():
ChilkatLog:
ChannelPoll:
ChilkatVersion: 9.5.0.61
This channel already received the EOF.
Sent SSH Channel CLOSE
--ChannelPoll
--ChilkatLog

2019-10-02 17:44:06.420 (44816) SSHClientBase::run() channel is [connected/open]:


[1/0]
2019-10-02 17:44:06.420 (44816) SSHClientBase::run() - Calling
cleanupTerminalType()
2019-10-02 17:44:06.420 (44816) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-10-02 17:44:06.420 (44816) SSHClientBase::run() - Calling ssh->Disconnect()
2019-10-02 17:44:06.439 (44816) SSHClientBase::run() - Calling ssh->Dispose()
2019-10-02 17:44:06.439 (44816) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-10-02 17:44:06.439 (110168) SSHClientBase::stop() called, thread is expected
to stop shortly
2019-10-02 17:44:06.439 (110168) SshLogFile::~SshLogFile() - there are 2 remaining
users
2019-10-02 17:49:30.928 (82700) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 0
2019-10-02 17:49:30.928 (82700) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-10-02 17:49:30.928 (82700) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-10-02 17:49:30.928 (82700) SSHClientBase::run() n == 0, this->username:
ts_frutos
2019-10-02 17:49:30.928 (82700) SSHClientBase::run() n == 0, length(newPassword):
11
2019-10-02 17:49:30.928 (82700) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 1
2019-10-02 17:49:30.928 (82700) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-10-02 17:49:30.928 (82700) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-10-02 17:49:30.928 (82700) SSHClientBase::run() n == 0, this->username:
ts_frutos
2019-10-02 17:49:30.928 (82700) SSHClientBase::run() n == 0, length(newPassword):
11
2019-10-02 17:49:30.928 (82700) SSHClientBase::run() - ssh->ChannelReadAndPoll2()
returned -1
2019-10-02 17:49:30.928 (82700) - - - - SSHClientBase::run() ssh->lastErrorText():
ChilkatLog:
ChannelPoll:
ChilkatVersion: 9.5.0.61
This channel already received the EOF.
Sent SSH Channel CLOSE
--ChannelPoll
--ChilkatLog

2019-10-02 17:49:30.928 (82700) SSHClientBase::run() channel is [connected/open]:


[1/0]
2019-10-02 17:49:30.928 (82700) SSHClientBase::run() - Calling
cleanupTerminalType()
2019-10-02 17:49:30.928 (82700) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-10-02 17:49:30.928 (82700) SSHClientBase::run() - Calling ssh->Disconnect()
2019-10-02 17:49:30.932 (82700) SSHClientBase::run() - Calling ssh->Dispose()
2019-10-02 17:49:30.932 (82700) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-10-02 17:49:30.932 (100808) SSHClientBase::stop() called, thread is expected
to stop shortly
2019-10-02 17:49:30.932 (100808) SshLogFile::~SshLogFile() - there are 1 remaining
users
2019-10-02 17:52:20.349 (66688) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 0
2019-10-02 17:52:20.349 (66688) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-10-02 17:52:20.349 (66688) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-10-02 17:52:20.349 (66688) SSHClientBase::run() n == 0, this->username:
ts_frutos
2019-10-02 17:52:20.349 (66688) SSHClientBase::run() n == 0, length(newPassword): 0
2019-10-02 17:52:20.349 (66688) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedEof(): 1
2019-10-02 17:52:20.349 (66688) SSHClientBase::run() n == 0, ssh-
>ChannelReceivedClose(): 0
2019-10-02 17:52:20.349 (66688) SSHClientBase::run() n == 0, ssh-
>get_DisconnectCode(): 0
2019-10-02 17:52:20.349 (66688) SSHClientBase::run() n == 0, this->username:
ts_frutos
2019-10-02 17:52:20.349 (66688) SSHClientBase::run() n == 0, length(newPassword): 0
2019-10-02 17:52:20.349 (66688) SSHClientBase::run() - ssh->ChannelReadAndPoll2()
returned -1
2019-10-02 17:52:20.349 (66688) - - - - SSHClientBase::run() ssh->lastErrorText():
ChilkatLog:
ChannelPoll:
ChilkatVersion: 9.5.0.61
This channel already received the EOF.
Sent SSH Channel CLOSE
--ChannelPoll
--ChilkatLog

2019-10-02 17:52:20.349 (66688) SSHClientBase::run() channel is [connected/open]:


[1/0]
2019-10-02 17:52:20.349 (66688) SSHClientBase::run() - Calling
cleanupTerminalType()
2019-10-02 17:52:20.349 (66688) SSHClientBase::run() - Calling ssh-
>ChannelSendClose()
2019-10-02 17:52:20.349 (66688) SSHClientBase::run() - Calling ssh->Disconnect()
2019-10-02 17:52:20.355 (66688) SSHClientBase::run() - Calling ssh->Dispose()
2019-10-02 17:52:20.355 (66688) SSHClientBase::run() - Setting event
hSshClientThreadFinishedEvent for driver to act on
2019-10-02 17:52:20.355 (46188) SSHClientBase::stop() called, thread is expected to
stop shortly
2019-10-02 17:52:20.355 (46188) SshLogFile::~SshLogFile() - Destroying object
2019-10-07 16:04:02.490 (66568) SSHClientBase::run() gAuthentication = 1
2019-10-07 16:04:03.105 (66568) SSHClient_Pw::authenticate() login name: sent
2019-10-07 16:06:56.566 (66568) SSHClient_Pw::authenticate() received login name:
administrator
2019-10-07 16:06:56.566 (66568) SSHClient_Pw::authenticate() password prompt sent
2019-10-07 16:07:00.266 (66568) SSHClient_Pw::authenticate() password received
2019-10-07 16:07:00.266 (66568) SSHClient_Pw::authenticate() authenticating towards
10.3.22.168
2019-10-07 16:07:00.266 (66568) SSHClient_Pw::authenticate() username:
administrator
2019-10-07 16:07:00.266 (66568) SSHClient_Pw::authenticate() length(password): 9
2019-10-07 16:07:00.286 (66568) SSHClient_Pw::authenticate() AuthenticatePw()
failed ssh->lastErrorText(): ChilkatLog:
AuthenticatePw:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
No longer connected to the SSH server.
--AuthenticatePw
--ChilkatLog

2019-10-07 16:07:00.286 (66568) SSHClient_Pw::authenticate()


get_PasswordChangeRequested() == false
2019-10-07 16:07:00.746 (66568) SSHClient_Pw::authenticate() connection lost,
reconnect result: 1
2019-10-07 16:07:00.746 (66568) SSHClient_Pw::authenticate() ssh->lastErrorText():
ChilkatLog:
Connect_Ssh:
DllDate: Oct 6 2016
ChilkatVersion: 9.5.0.61
UnlockPrefix: ERCSSNSSH
Architecture: Little Endian; 32-bit
Language: Visual C++ 9.0 (32-bit)
VerboseLogging: 0
SshVersion: SSH-2.0-OpenSSH_6.6.1
connectInner:
hostname: 10.3.22.168
port: 4422
sshConnect:
Established TCP/IP connection with SSH server
--sshConnect
sshSetupConnection:
clientIdentifier: SSH-2.0-PuTTY_Release_0.66
Sending client identifier...
Done sending client identifier.
Reading server version...
initialDataFromSshServer: SSH-2.0-OpenSSH_6.6.1

serverVersion: SSH-2.0-OpenSSH_6.6.1
KeyExchangeAlgs:
algorithm: curve25519-sha256@libssh.org
algorithm: ecdh-sha2-nistp256
algorithm: ecdh-sha2-nistp384
algorithm: ecdh-sha2-nistp521
algorithm: diffie-hellman-group-exchange-sha256
algorithm: diffie-hellman-group-exchange-sha1
algorithm: diffie-hellman-group14-sha1
algorithm: diffie-hellman-group1-sha1
--KeyExchangeAlgs
HostKeyAlgs:
algorithm: ssh-rsa
algorithm: ssh-dss
algorithm: ecdsa-sha2-nistp256
algorithm: ssh-ed25519
--HostKeyAlgs
EncCS:
algorithm: aes128-ctr
algorithm: aes256-ctr
algorithm: arcfour256
algorithm: arcfour
algorithm: aes128-cbc
algorithm: aes256-cbc
--EncCS
EncSC:
algorithm: aes128-ctr
algorithm: aes256-ctr
algorithm: arcfour256
algorithm: arcfour
algorithm: aes128-cbc
algorithm: aes256-cbc
--EncSC
MacCS:
algorithm: hmac-md5-etm@openssh.com
algorithm: hmac-sha1-etm@openssh.com
algorithm: umac-64-etm@openssh.com
algorithm: umac-128-etm@openssh.com
algorithm: hmac-sha2-256-etm@openssh.com
algorithm: hmac-sha2-512-etm@openssh.com
algorithm: hmac-ripemd160-etm@openssh.com
algorithm: hmac-sha1-96-etm@openssh.com
algorithm: hmac-md5-96-etm@openssh.com
algorithm: hmac-md5
algorithm: hmac-sha1
algorithm: umac-64@openssh.com
algorithm: umac-128@openssh.com
algorithm: hmac-sha2-256
algorithm: hmac-sha2-512
algorithm: hmac-ripemd160
algorithm: hmac-ripemd160@openssh.com
algorithm: hmac-sha1-96
algorithm: hmac-md5-96
--MacCS
MacSC:
algorithm: hmac-md5-etm@o

S-ar putea să vă placă și