Hi

I'm trying to get Ultra edit tunneling. It's an ftp type editor.

I get an error "Invalid Password:  530 Login incorrect".

I've got tunneling setup as FTP listening on 4100 local 127.0.0.1 
forwarding to 127.0.0.1 port 21. It seems to work at some level since I can 
see an exchange of packets using snoop, port 22 of course and encrypted 
(can ssh be run clear text for debugging purposes?). TCP forwarding is 
enabled on the server.

Here's my debug:

# /usr/local/sbin/sshd2 -v
sshd2: SSH Secure Shell 2.4.0 (non-commercial version) on sparc-sun-solaris2.8
debug: Reading private host key from /etc/ssh2/hostkey
debug: Key comment: 1024-bit dsa hostkey
debug: SshConfig/sshconfig.c:2055/ssh_server_load_host_key: Reading public 
host key from: /etc/ssh2/hostkey.pub
debug: Becoming server.
debug: Creating listener
debug: Listener created
debug: no udp listener created.
debug: Running event loop
debug: Sshd2/sshd2.c:579/new_connection_callback: new_connection_callback
debug: Sshd2/sshd2.c:732/new_connection_callback: Wrapping stream with 
ssh_server_wrap...
debug: ssh_server_wrap: creating transport protocol
debug: 
SshAuthMethodServer/sshauthmethods.c:113/ssh_server_authentication_initialize: 
Added "publickey" to usable methods.
debug: 
SshAuthMethodServer/sshauthmethods.c:113/ssh_server_authentication_initialize: 
Added "password" to usable methods.
debug: ssh_server_wrap: creating userauth protocol
debug: Ssh2Common/sshcommon.c:502/ssh_common_wrap: local ip = 192.168.0.15, 
local port = 22
debug: Ssh2Common/sshcommon.c:504/ssh_common_wrap: remote ip = 192.168.0.3, 
remote port = 3040
debug: SshConnection/sshconn.c:1866/ssh_conn_wrap: Wrapping...
debug: Sshd2/sshd2.c:743/new_connection_callback: done.
debug: new_connection_callback returning
debug: Ssh2Transport/trcommon.c:599/ssh_tr_input_version: Remote version: 
SSH-1.99-2.4.0 SSH Secure Shell for Windows
debug: Ssh2Transport/trcommon.c:1120/ssh_tr_negotiate: c_to_s: cipher 
3des-cbc, mac hmac-md5, compression none
debug: Ssh2Transport/trcommon.c:1123/ssh_tr_negotiate: s_to_c: cipher 
3des-cbc, mac hmac-md5, compression none
debug: Sshd2/sshd2.c:349/auth_policy_proc: user 'rlh' service 
'ssh-connection' client_ip '192.168.0.3' client_port '3040' completed ''
debug: Sshd2/sshd2.c:476/auth_policy_proc: output: publickey,password
debug: Sshd2/sshd2.c:349/auth_policy_proc: user 'rlh' service 
'ssh-connection' client_ip '192.168.0.3' client_port '3040' completed 
'publickey'
debug: Sshd2/sshd2.c:476/auth_policy_proc: output: password
debug: 
SshUnixUser/sshunixuser.c:1240/ssh_user_validate_secure_rpc_password: not 
yet implemented
debug: SshUnixUser/sshunixuser.c:1228/ssh_user_validate_kerberos_password: 
kerberos support not compiled in
debug: Sshd2/sshd2.c:349/auth_policy_proc: user 'rlh' service 
'ssh-connection' client_ip '192.168.0.3' client_port '3040' completed 
'publickey,password'
debug: Ssh2Common/sshcommon.c:306/ssh_common_special: Received 
SSH_CROSS_STARTUP packet from connection protocol.
debug: Ssh2Common/sshcommon.c:356/ssh_common_special: Received 
SSH_CROSS_ALGORITHMS packet from connection protocol.
debug: Ssh2Common/sshcommon.c:274/ssh_common_special: Received 
SSH_CROSS_AUTHENTICATED packet from connection protocol.
debug: Ssh2Common/sshcommon.c:704/ssh_common_new_channel: num_channels now 1
debug: Ssh2ChannelSession/sshchsession.c:1026/ssh_channel_session_exec: 
Allocating pty.
debug: SshTtyFlags/sshttyflags.c:460/ssh_decode_tty_flags: Not a tty. (fd = 7)
**********************  below are a few attempts at 
tunneling  **************************************
debug: Direct TCP/IP connect to 127.0.0.1:21 from 127.0.0.1:3048
debug: Ssh2Common/sshcommon.c:704/ssh_common_new_channel: num_channels now 2
debug: Direct TCP/IP connect to 127.0.0.1:21 from 127.0.0.1:3050
debug: Ssh2Common/sshcommon.c:704/ssh_common_new_channel: num_channels now 3
debug: Ssh2Common/sshcommon.c:678/ssh_common_destroy_channel: num_channels 
now 2
debug: Direct TCP/IP connect to 127.0.0.1:21 from 127.0.0.1:3053
debug: Ssh2Common/sshcommon.c:704/ssh_common_new_channel: num_channels now 3
debug: Ssh2Common/sshcommon.c:678/ssh_common_destroy_channel: num_channels 
now 2



Thanks

Roy Harrison
The Research Libraries Group





"The basis for the new world order must be universal respect for human 
rights, but it will mean nothing if this imperative doesn't derive from the 
respect for the miracle of Being, the miracle of the universe, the miracle 
of nature, the miracle of our own existence. "

-Vaclav Havel

Reply via email to