Some users report ssh.exe exiting with long pasted content #10587

Closed
opened 2026-01-31 02:25:12 +00:00 by claunia · 15 comments
Owner

Originally created by @aesm1p on GitHub (Sep 11, 2020).

The connection crashes when making a multi-line copy on a remote host.

Originally created by @aesm1p on GitHub (Sep 11, 2020). The connection crashes when making a multi-line copy on a remote host.
claunia added the Resolution-ExternalNeeds-Tag-FixNeeds-Attention labels 2026-01-31 02:25:13 +00:00
Author
Owner

@DHowett commented on GitHub (Sep 11, 2020):

Can you give us any more information than that? Literally anything? Version numbers, what application, what it looks like when it crashes, etc.?

@DHowett commented on GitHub (Sep 11, 2020): Can you give us _any_ more information than that? Literally anything? Version numbers, what application, what it looks like when it crashes, etc.?
Author
Owner

@aesm1p commented on GitHub (Sep 12, 2020):

My WindowsTerminal version is v1.3.2382.0, remote host is a kali linux, When I type in a very long string like aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa,it would crash. For example, when I execute command echo aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa,it would exit the ssh connection.
Error message: **echo aaaaaapacket_write_poll: Connection to xx.xx.xx.xxx port 22: eother [Exited process, code 255] ** .There is no such bug if it is not a preview release,

@aesm1p commented on GitHub (Sep 12, 2020): My WindowsTerminal version is **v1.3.2382.0**, remote host is a kali linux, When I type in a very long string like `aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa`,it would crash. For example, when I execute command `echo aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa`,it would exit the ssh connection. **Error message**: **echo aaaaaapacket_write_poll: Connection to xx.xx.xx.xxx port 22: eother [Exited process, code 255] ** .There is no such bug if it is not a preview release,
Author
Owner

@DHowett commented on GitHub (Sep 18, 2020):

@Z-LL reported the same issue in #7651 without the preview release. I tried, but I cannot make this happen!

@DHowett commented on GitHub (Sep 18, 2020): @Z-LL reported the same issue in #7651 without the preview release. I tried, but I cannot make this happen!
Author
Owner

@DHowett commented on GitHub (Sep 18, 2020):

What version of the ssh server are you using on Kali Linux (@PPointCharles) and your remote host (@Z-LL)? Please run ssh -V on the server.

@DHowett commented on GitHub (Sep 18, 2020): What version of the ssh server are you using on Kali Linux (@PPointCharles) and your remote host (@Z-LL)? Please run `ssh -V` on the server.
Author
Owner

@Z-LL commented on GitHub (Sep 18, 2020):

What version of the ssh server are you using on Kali Linux (@PPointCharles) and your remote host (@Z-LL)? Please run ssh -V on the server.

ssh -V

OpenSSH_7.6p1 Ubuntu-4ubuntu0.3, OpenSSL 1.0.2n  7 Dec 2017

It should be noted that this problem of mine occurred after directly entering SSH (in settings.json: "commandline": "ssh user@ip"). Indirect access (such as entering cmd first, then command SSH) does not have this problem

@Z-LL commented on GitHub (Sep 18, 2020): > > > What version of the ssh server are you using on Kali Linux (@PPointCharles) and your remote host (@Z-LL)? Please run `ssh -V` on the server. ``` ssh -V OpenSSH_7.6p1 Ubuntu-4ubuntu0.3, OpenSSL 1.0.2n 7 Dec 2017 ``` It should be noted that this problem of mine occurred after directly entering SSH (in settings.json: "commandline": "ssh user@ip"). Indirect access (such as entering cmd first, then command SSH) does not have this problem
Author
Owner

@aesm1p commented on GitHub (Sep 18, 2020):

My Kali Linux version: OpenSSH_8.1p1 Debian-1, OpenSSL 1.1.1d 10 Sep 2019
Windows Terminal version: 1.3.2382.0
Windows ssh.exe version: OpenSSH_for_Windows_7.7p1, LibreSSL 2.6.5
PS: As long as it's a copy operation, it crashes, single-line replication also triggers this problem.

@aesm1p commented on GitHub (Sep 18, 2020): **My Kali Linux version**: OpenSSH_8.1p1 Debian-1, OpenSSL 1.1.1d 10 Sep 2019 **Windows Terminal version**: 1.3.2382.0 **Windows ssh.exe version**: OpenSSH_for_Windows_7.7p1, LibreSSL 2.6.5 PS: As long as it's a copy operation, it crashes, single-line replication also triggers this problem.
Author
Owner

@DHowett commented on GitHub (Sep 21, 2020):

Can you try ssh -v -v -v instead of just ssh? It will enable debug logging.

I cannot reproduce this issue, even with my system locale set to zh-CN.

What keyboard layout are both of you using?

@DHowett commented on GitHub (Sep 21, 2020): Can you try `ssh -v -v -v` instead of just `ssh`? It will enable debug logging. I cannot reproduce this issue, even with my system locale set to zh-CN. What keyboard layout are both of you using?
Author
Owner

@DHowett commented on GitHub (Sep 21, 2020):

(Sorry - I meant to say -v -v -v. I updated the comment.)

@DHowett commented on GitHub (Sep 21, 2020): (Sorry - I meant to say `-v -v -v`. I updated the comment.)
Author
Owner

@Z-LL commented on GitHub (Sep 22, 2020):

1 enter directly: "commandline": "ssh -v -v -v user1@ip"

result

OpenSSH_for_Windows_7.7p1, LibreSSL 2.6.5
debug1: Reading configuration data C:\Users\user2/.ssh/config
debug1: C:\Users\user2/.ssh/config line 1: Applying options for ip
debug3: Failed to open file:C:/ProgramData/ssh/ssh_config error:2
debug2: resolve_canonicalize: hostname ip is address
debug2: ssh_connect_direct: needpriv 0
debug1: Connecting to ip [ip] port 22.
debug1: Connection established.
debug1: identity file C:\Users\user2/.ssh/id_rsa type 0
debug3: Failed to open file:C:/Users/user2/.ssh/id_rsa-cert error:2
debug3: Failed to open file:C:/Users/user2/.ssh/id_rsa-cert.pub error:2
debug1: key_load_public: No such file or directory
debug1: identity file C:\Users\user2/.ssh/id_rsa-cert type -1
debug3: Failed to open file:C:/Users/user2/.ssh/id_dsa error:2
debug3: Failed to open file:C:/Users/user2/.ssh/id_dsa.pub error:2
debug1: key_load_public: No such file or directory
debug1: identity file C:\Users\user2/.ssh/id_dsa type -1
debug3: Failed to open file:C:/Users/user2/.ssh/id_dsa-cert error:2
debug3: Failed to open file:C:/Users/user2/.ssh/id_dsa-cert.pub error:2
debug1: key_load_public: No such file or directory
debug1: identity file C:\Users\user2/.ssh/id_dsa-cert type -1
debug3: Failed to open file:C:/Users/user2/.ssh/id_ecdsa error:2
debug3: Failed to open file:C:/Users/user2/.ssh/id_ecdsa.pub error:2
debug1: key_load_public: No such file or directory
debug1: identity file C:\Users\user2/.ssh/id_ecdsa type -1
debug3: Failed to open file:C:/Users/user2/.ssh/id_ecdsa-cert error:2
debug3: Failed to open file:C:/Users/user2/.ssh/id_ecdsa-cert.pub error:2
debug1: key_load_public: No such file or directory
debug1: identity file C:\Users\user2/.ssh/id_ecdsa-cert type -1
debug3: Failed to open file:C:/Users/user2/.ssh/id_ed25519 error:2
debug3: Failed to open file:C:/Users/user2/.ssh/id_ed25519.pub error:2
debug1: key_load_public: No such file or directory
debug1: identity file C:\Users\user2/.ssh/id_ed25519 type -1
debug3: Failed to open file:C:/Users/user2/.ssh/id_ed25519-cert error:2
debug3: Failed to open file:C:/Users/user2/.ssh/id_ed25519-cert.pub error:2
debug1: key_load_public: No such file or directory
debug1: identity file C:\Users\user2/.ssh/id_ed25519-cert type -1
debug3: Failed to open file:C:/Users/user2/.ssh/id_xmss error:2
debug3: Failed to open file:C:/Users/user2/.ssh/id_xmss.pub error:2
debug1: key_load_public: No such file or directory
debug1: identity file C:\Users\user2/.ssh/id_xmss type -1
debug3: Failed to open file:C:/Users/user2/.ssh/id_xmss-cert error:2
debug3: Failed to open file:C:/Users/user2/.ssh/id_xmss-cert.pub error:2
debug1: key_load_public: No such file or directory
debug1: identity file C:\Users\user2/.ssh/id_xmss-cert type -1
debug1: Local version string SSH-2.0-OpenSSH_for_Windows_7.7
debug1: Remote protocol version 2.0, remote software version OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
debug1: match: OpenSSH_7.6p1 Ubuntu-4ubuntu0.3 pat OpenSSH* compat 0x04000000
debug2: fd 3 setting O_NONBLOCK
debug1: Authenticating to ip:22 as 'user1'
debug3: hostkeys_foreach: reading file "C:\Users\user2/.ssh/known_hosts"
debug3: record_hostkey: found key type ECDSA in file C:\Users\user2/.ssh/known_hosts:2
debug3: load_hostkeys: loaded 1 keys from ip
debug3: Failed to open file:C:/Users/user2/.ssh/known_hosts2 error:2
debug3: Failed to open file:C:/ProgramData/ssh/ssh_known_hosts error:2
debug3: Failed to open file:C:/ProgramData/ssh/ssh_known_hosts2 error:2
debug3: order_hostkeyalgs: prefer hostkeyalgs: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521
debug3: send packet: type 20
debug1: SSH2_MSG_KEXINIT sent
debug3: receive packet: type 20
debug1: SSH2_MSG_KEXINIT received
debug2: local client KEXINIT proposal
debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,ext-info-c
debug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa
debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com
debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com
debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: compression ctos: none
debug2: compression stoc: none
debug2: languages ctos:
debug2: languages stoc:
debug2: first_kex_follows 0
debug2: reserved 0
debug2: peer server KEXINIT proposal
debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1
debug2: host key algorithms: ssh-rsa,rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519
debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com
debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com
debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: compression ctos: none,zlib@openssh.com
debug2: compression stoc: none,zlib@openssh.com
debug2: languages ctos:
debug2: languages stoc:
debug2: first_kex_follows 0
debug2: reserved 0
debug1: kex: algorithm: curve25519-sha256
debug1: kex: host key algorithm: ecdsa-sha2-nistp256
debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none
debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none
debug3: send packet: type 30
debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
debug3: receive packet: type 31
debug1: Server host key: ecdsa-sha2-nistp256 SHA256:zlHmnr6lkVxh6s6B2kZO/1qNsaaW4hJ3r3nPtfSefhE
debug3: hostkeys_foreach: reading file "C:\Users\user2/.ssh/known_hosts"
debug3: record_hostkey: found key type ECDSA in file C:\Users\user2/.ssh/known_hosts:2
debug3: load_hostkeys: loaded 1 keys from ip
debug3: Failed to open file:C:/Users/user2/.ssh/known_hosts2 error:2
debug3: Failed to open file:C:/ProgramData/ssh/ssh_known_hosts error:2
debug3: Failed to open file:C:/ProgramData/ssh/ssh_known_hosts2 error:2
debug1: Host 'ip' is known and matches the ECDSA host key.
debug1: Found key in C:\Users\user2/.ssh/known_hosts:2
debug3: send packet: type 21
debug2: set_newkeys: mode 1
debug1: rekey after 134217728 blocks
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug3: receive packet: type 21
debug1: SSH2_MSG_NEWKEYS received
debug2: set_newkeys: mode 0
debug1: rekey after 134217728 blocks
debug3: unable to connect to pipe \\.\pipe\openssh-ssh-agent, error: 2
debug1: pubkey_prepare: ssh_get_authentication_socket: No such file or directory
debug2: key: C:\Users\user2/.ssh/id_rsa (000001AD8C68FE60)
debug2: key: C:\Users\user2/.ssh/id_dsa (0000000000000000)
debug2: key: C:\Users\user2/.ssh/id_ecdsa (0000000000000000)
debug2: key: C:\Users\user2/.ssh/id_ed25519 (0000000000000000)
debug2: key: C:\Users\user2/.ssh/id_xmss (0000000000000000)
debug3: send packet: type 5
debug3: receive packet: type 7
debug1: SSH2_MSG_EXT_INFO received
debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521>
debug3: receive packet: type 6
debug2: service_accept: ssh-userauth
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug3: send packet: type 50
debug3: receive packet: type 51
debug1: Authentications that can continue: publickey,password
debug3: start over, passed a different list publickey,password
debug3: preferred publickey,keyboard-interactive,password
debug3: authmethod_lookup publickey
debug3: remaining preferred: keyboard-interactive,password
debug3: authmethod_is_enabled publickey
debug1: Next authentication method: publickey
debug1: Offering public key: RSA SHA256:V1bsjGlaK+VtByYnbnDLldurkjaTEVnn6uetr6YePAc C:\Users\user2/.ssh/id_rsa
debug3: send_pubkey_test
debug3: send packet: type 50
debug2: we sent a publickey packet, wait for reply
debug3: receive packet: type 60
debug1: Server accepts key: pkalg rsa-sha2-512 blen 279
debug2: input_userauth_pk_ok: fp SHA256:V1bsjGlaK+VtByYnbnDLldurkjaTEVnn6uetr6YePAc
debug3: sign_and_send_pubkey: RSA SHA256:V1bsjGlaK+VtByYnbnDLldurkjaTEVnn6uetr6YePAc
debug3: send packet: type 50
debug3: receive packet: type 52
debug1: Authentication succeeded (publickey).
Authenticated to ip ([ip]:22).
debug1: channel 0: new [client-session]
debug3: ssh_session2_open: channel_new: 0
debug2: channel 0: send open
debug3: send packet: type 90
debug1: Requesting no-more-sessions@openssh.com
debug3: send packet: type 80
debug1: Entering interactive session.
debug1: pledge: network
debug1: console supports the ansi parsing
debug3: Successfully set console output code page from:936 to 65001
debug3: Successfully set console input code page from:936 to 65001
debug3: receive packet: type 80
debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0
debug3: receive packet: type 91
debug2: channel_input_open_confirmation: channel 0: callback start
debug2: fd 3 setting TCP_NODELAY
debug2: client_session2_setup: id 0
debug2: channel 0: request pty-req confirm 1
debug3: send packet: type 98
debug2: channel 0: request shell confirm 1
debug3: send packet: type 98
debug2: channel_input_open_confirmation: channel 0: callback done
debug2: channel 0: open confirm rwindow 0 rmax 32768
debug3: receive packet: type 99
debug2: channel_input_status_confirm: type 99 id 0
debug2: PTY allocation request accepted on channel 0
debug2: channel 0: rcvd adjust 2097152
debug3: receive packet: type 99
debug2: channel_input_status_confirm: type 99 id 0
debug2: shell request accepted on channel 0
Welcome to Ubuntu 18.04 LTS (GNU/Linux 4.15.0-106-generic x86_64)

363 packages can be updated.
36 updates are security updates.

*** System restart required ***
Last login: Tue Sep 22 12:42:49 2020 from 192.168.40.18
user1@user1-X9DRL-3F-iF:~$

Same paste problem

2 Indirect entry: "commandline": "cmd.exe", then command “ssh -v -v -v user1@ip”

$ ssh -v -v -v user1@ip

result

OpenSSH_8.3p1, OpenSSL 1.1.1g 21 Apr 2020
debug1: Reading configuration data /c/Users/user2/.ssh/config
debug1: /c/Users/user2/.ssh/config line 1: Applying options for ip
debug1: Reading configuration data /etc/ssh/ssh_config
debug2: resolve_canonicalize: hostname ip is address
debug2: ssh_connect_direct
debug1: Connecting to ip [ip] port 22.
debug1: Connection established.
debug1: identity file /c/Users/user2/.ssh/id_rsa type 0
debug1: identity file /c/Users/user2/.ssh/id_rsa-cert type -1
debug1: identity file /c/Users/user2/.ssh/id_dsa type -1
debug1: identity file /c/Users/user2/.ssh/id_dsa-cert type -1
debug1: identity file /c/Users/user2/.ssh/id_ecdsa type -1
debug1: identity file /c/Users/user2/.ssh/id_ecdsa-cert type -1
debug1: identity file /c/Users/user2/.ssh/id_ecdsa_sk type -1
debug1: identity file /c/Users/user2/.ssh/id_ecdsa_sk-cert type -1
debug1: identity file /c/Users/user2/.ssh/id_ed25519 type -1
debug1: identity file /c/Users/user2/.ssh/id_ed25519-cert type -1
debug1: identity file /c/Users/user2/.ssh/id_ed25519_sk type -1
debug1: identity file /c/Users/user2/.ssh/id_ed25519_sk-cert type -1
debug1: identity file /c/Users/user2/.ssh/id_xmss type -1
debug1: identity file /c/Users/user2/.ssh/id_xmss-cert type -1
debug1: Local version string SSH-2.0-OpenSSH_8.3
debug1: Remote protocol version 2.0, remote software version OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
debug1: match: OpenSSH_7.6p1 Ubuntu-4ubuntu0.3 pat OpenSSH_7.0*,OpenSSH_7.1*,OpenSSH_7.2*,OpenSSH_7.3*,OpenSSH_7.4*,OpenSSH_7.5*,OpenSSH_7.6*,OpenSSH_7.7* compat 0x04000002
debug2: fd 3 setting O_NONBLOCK
debug1: Authenticating to ip:22 as 'user1'
debug3: hostkeys_foreach: reading file "/c/Users/user2/.ssh/known_hosts"
debug3: record_hostkey: found key type ECDSA in file /c/Users/user2/.ssh/known_hosts:2
debug3: load_hostkeys: loaded 1 keys from ip
debug3: order_hostkeyalgs: prefer hostkeyalgs: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521
debug3: send packet: type 20
debug1: SSH2_MSG_KEXINIT sent
debug3: receive packet: type 20
debug1: SSH2_MSG_KEXINIT received
debug2: local client KEXINIT proposal
debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,ext-info-c
debug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,ssh-ed25519-cert-v01@openssh.com,sk-ssh-ed25519-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,sk-ecdsa-sha2-nistp256@openssh.com,ssh-ed25519,sk-ssh-ed25519@openssh.com,rsa-sha2-512,rsa-sha2-256,ssh-rsa
debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,3des-cbc,aes256-cbc,aes192-cbc
debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,3des-cbc,aes256-cbc,aes192-cbc
debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: compression ctos: none,zlib@openssh.com,zlib
debug2: compression stoc: none,zlib@openssh.com,zlib
debug2: languages ctos:
debug2: languages stoc:
debug2: first_kex_follows 0
debug2: reserved 0
debug2: peer server KEXINIT proposal
debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1
debug2: host key algorithms: ssh-rsa,rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519
debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com
debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com
debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: compression ctos: none,zlib@openssh.com
debug2: compression stoc: none,zlib@openssh.com
debug2: languages ctos:
debug2: languages stoc:
debug2: first_kex_follows 0
debug2: reserved 0
debug1: kex: algorithm: curve25519-sha256
debug1: kex: host key algorithm: ecdsa-sha2-nistp256
debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none
debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none
debug3: send packet: type 30
debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
debug3: receive packet: type 31
debug1: Server host key: ecdsa-sha2-nistp256 SHA256:zlHmnr6lkVxh6s6B2kZO/1qNsaaW4hJ3r3nPtfSefhE
debug3: hostkeys_foreach: reading file "/c/Users/user2/.ssh/known_hosts"
debug3: record_hostkey: found key type ECDSA in file /c/Users/user2/.ssh/known_hosts:2
debug3: load_hostkeys: loaded 1 keys from ip
debug1: Host 'ip' is known and matches the ECDSA host key.
debug1: Found key in /c/Users/user2/.ssh/known_hosts:2
debug3: send packet: type 21
debug2: set_newkeys: mode 1
debug1: rekey out after 134217728 blocks
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug3: receive packet: type 21
debug1: SSH2_MSG_NEWKEYS received
debug2: set_newkeys: mode 0
debug1: rekey in after 134217728 blocks
debug1: Will attempt key: /c/Users/user2/.ssh/id_rsa RSA SHA256:V1bsjGlaK+VtByYnbnDLldurkjaTEVnn6uetr6YePAc
debug1: Will attempt key: /c/Users/user2/.ssh/id_dsa
debug1: Will attempt key: /c/Users/user2/.ssh/id_ecdsa
debug1: Will attempt key: /c/Users/user2/.ssh/id_ecdsa_sk
debug1: Will attempt key: /c/Users/user2/.ssh/id_ed25519
debug1: Will attempt key: /c/Users/user2/.ssh/id_ed25519_sk
debug1: Will attempt key: /c/Users/user2/.ssh/id_xmss
debug2: pubkey_prepare: done
debug3: send packet: type 5
debug3: receive packet: type 7
debug1: SSH2_MSG_EXT_INFO received
debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521>
debug3: receive packet: type 6
debug2: service_accept: ssh-userauth
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug3: send packet: type 50
debug3: receive packet: type 51
debug1: Authentications that can continue: publickey,password
debug3: start over, passed a different list publickey,password
debug3: preferred publickey,keyboard-interactive,password
debug3: authmethod_lookup publickey
debug3: remaining preferred: keyboard-interactive,password
debug3: authmethod_is_enabled publickey
debug1: Next authentication method: publickey
debug1: Offering public key: /c/Users/user2/.ssh/id_rsa RSA SHA256:V1bsjGlaK+VtByYnbnDLldurkjaTEVnn6uetr6YePAc
debug3: send packet: type 50
debug2: we sent a publickey packet, wait for reply
debug3: receive packet: type 60
debug1: Server accepts key: /c/Users/user2/.ssh/id_rsa RSA SHA256:V1bsjGlaK+VtByYnbnDLldurkjaTEVnn6uetr6YePAc
debug3: sign_and_send_pubkey: RSA SHA256:V1bsjGlaK+VtByYnbnDLldurkjaTEVnn6uetr6YePAc
debug3: sign_and_send_pubkey: signing using rsa-sha2-512 SHA256:V1bsjGlaK+VtByYnbnDLldurkjaTEVnn6uetr6YePAc
debug3: send packet: type 50
debug3: receive packet: type 52
debug1: Authentication succeeded (publickey).
Authenticated to ip ([ip]:22).
debug1: channel 0: new [client-session]
debug3: ssh_session2_open: channel_new: 0
debug2: channel 0: send open
debug3: send packet: type 90
debug1: Requesting no-more-sessions@openssh.com
debug3: send packet: type 80
debug1: Entering interactive session.
debug1: pledge: network
debug3: receive packet: type 80
debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0
debug3: receive packet: type 91
debug2: channel_input_open_confirmation: channel 0: callback start
debug2: fd 3 setting TCP_NODELAY
debug3: ssh_packet_set_tos: set IP_TOS 0x48
debug2: client_session2_setup: id 0
debug2: channel 0: request pty-req confirm 1
debug3: send packet: type 98
debug2: channel 0: request shell confirm 1
debug3: send packet: type 98
debug2: channel_input_open_confirmation: channel 0: callback done
debug2: channel 0: open confirm rwindow 0 rmax 32768
debug3: receive packet: type 99
debug2: channel_input_status_confirm: type 99 id 0
debug2: PTY allocation request accepted on channel 0
debug2: channel 0: rcvd adjust 2097152
debug3: receive packet: type 99
debug2: channel_input_status_confirm: type 99 id 0
debug2: shell request accepted on channel 0
Welcome to Ubuntu 18.04 LTS (GNU/Linux 4.15.0-106-generic x86_64)

363 packages can be updated.
36 updates are security updates.

*** System restart required ***
Last login: Tue Sep 22 12:42:27 2020 from 192.168.40.18
user1@user1-X9DRL-3F-iF:~$

No paste problem

3 Keyboard layout

Only Microsoft Pinyin

@Z-LL commented on GitHub (Sep 22, 2020): # 1 enter directly: "commandline": "ssh -v -v -v user1@ip" <details> <summary>result</summary> OpenSSH_for_Windows_7.7p1, LibreSSL 2.6.5 debug1: Reading configuration data C:\\Users\\user2/.ssh/config debug1: C:\\Users\\user2/.ssh/config line 1: Applying options for ip debug3: Failed to open file:C:/ProgramData/ssh/ssh_config error:2 debug2: resolve_canonicalize: hostname ip is address debug2: ssh_connect_direct: needpriv 0 debug1: Connecting to ip [ip] port 22. debug1: Connection established. debug1: identity file C:\\Users\\user2/.ssh/id_rsa type 0 debug3: Failed to open file:C:/Users/user2/.ssh/id_rsa-cert error:2 debug3: Failed to open file:C:/Users/user2/.ssh/id_rsa-cert.pub error:2 debug1: key_load_public: No such file or directory debug1: identity file C:\\Users\\user2/.ssh/id_rsa-cert type -1 debug3: Failed to open file:C:/Users/user2/.ssh/id_dsa error:2 debug3: Failed to open file:C:/Users/user2/.ssh/id_dsa.pub error:2 debug1: key_load_public: No such file or directory debug1: identity file C:\\Users\\user2/.ssh/id_dsa type -1 debug3: Failed to open file:C:/Users/user2/.ssh/id_dsa-cert error:2 debug3: Failed to open file:C:/Users/user2/.ssh/id_dsa-cert.pub error:2 debug1: key_load_public: No such file or directory debug1: identity file C:\\Users\\user2/.ssh/id_dsa-cert type -1 debug3: Failed to open file:C:/Users/user2/.ssh/id_ecdsa error:2 debug3: Failed to open file:C:/Users/user2/.ssh/id_ecdsa.pub error:2 debug1: key_load_public: No such file or directory debug1: identity file C:\\Users\\user2/.ssh/id_ecdsa type -1 debug3: Failed to open file:C:/Users/user2/.ssh/id_ecdsa-cert error:2 debug3: Failed to open file:C:/Users/user2/.ssh/id_ecdsa-cert.pub error:2 debug1: key_load_public: No such file or directory debug1: identity file C:\\Users\\user2/.ssh/id_ecdsa-cert type -1 debug3: Failed to open file:C:/Users/user2/.ssh/id_ed25519 error:2 debug3: Failed to open file:C:/Users/user2/.ssh/id_ed25519.pub error:2 debug1: key_load_public: No such file or directory debug1: identity file C:\\Users\\user2/.ssh/id_ed25519 type -1 debug3: Failed to open file:C:/Users/user2/.ssh/id_ed25519-cert error:2 debug3: Failed to open file:C:/Users/user2/.ssh/id_ed25519-cert.pub error:2 debug1: key_load_public: No such file or directory debug1: identity file C:\\Users\\user2/.ssh/id_ed25519-cert type -1 debug3: Failed to open file:C:/Users/user2/.ssh/id_xmss error:2 debug3: Failed to open file:C:/Users/user2/.ssh/id_xmss.pub error:2 debug1: key_load_public: No such file or directory debug1: identity file C:\\Users\\user2/.ssh/id_xmss type -1 debug3: Failed to open file:C:/Users/user2/.ssh/id_xmss-cert error:2 debug3: Failed to open file:C:/Users/user2/.ssh/id_xmss-cert.pub error:2 debug1: key_load_public: No such file or directory debug1: identity file C:\\Users\\user2/.ssh/id_xmss-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_for_Windows_7.7 debug1: Remote protocol version 2.0, remote software version OpenSSH_7.6p1 Ubuntu-4ubuntu0.3 debug1: match: OpenSSH_7.6p1 Ubuntu-4ubuntu0.3 pat OpenSSH* compat 0x04000000 debug2: fd 3 setting O_NONBLOCK debug1: Authenticating to ip:22 as 'user1' debug3: hostkeys_foreach: reading file "C:\\Users\\user2/.ssh/known_hosts" debug3: record_hostkey: found key type ECDSA in file C:\\Users\\user2/.ssh/known_hosts:2 debug3: load_hostkeys: loaded 1 keys from ip debug3: Failed to open file:C:/Users/user2/.ssh/known_hosts2 error:2 debug3: Failed to open file:C:/ProgramData/ssh/ssh_known_hosts error:2 debug3: Failed to open file:C:/ProgramData/ssh/ssh_known_hosts2 error:2 debug3: order_hostkeyalgs: prefer hostkeyalgs: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521 debug3: send packet: type 20 debug1: SSH2_MSG_KEXINIT sent debug3: receive packet: type 20 debug1: SSH2_MSG_KEXINIT received debug2: local client KEXINIT proposal debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,ext-info-c debug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 debug2: compression ctos: none debug2: compression stoc: none debug2: languages ctos: debug2: languages stoc: debug2: first_kex_follows 0 debug2: reserved 0 debug2: peer server KEXINIT proposal debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1 debug2: host key algorithms: ssh-rsa,rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519 debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 debug2: compression ctos: none,zlib@openssh.com debug2: compression stoc: none,zlib@openssh.com debug2: languages ctos: debug2: languages stoc: debug2: first_kex_follows 0 debug2: reserved 0 debug1: kex: algorithm: curve25519-sha256 debug1: kex: host key algorithm: ecdsa-sha2-nistp256 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none debug3: send packet: type 30 debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug3: receive packet: type 31 debug1: Server host key: ecdsa-sha2-nistp256 SHA256:zlHmnr6lkVxh6s6B2kZO/1qNsaaW4hJ3r3nPtfSefhE debug3: hostkeys_foreach: reading file "C:\\Users\\user2/.ssh/known_hosts" debug3: record_hostkey: found key type ECDSA in file C:\\Users\\user2/.ssh/known_hosts:2 debug3: load_hostkeys: loaded 1 keys from ip debug3: Failed to open file:C:/Users/user2/.ssh/known_hosts2 error:2 debug3: Failed to open file:C:/ProgramData/ssh/ssh_known_hosts error:2 debug3: Failed to open file:C:/ProgramData/ssh/ssh_known_hosts2 error:2 debug1: Host 'ip' is known and matches the ECDSA host key. debug1: Found key in C:\\Users\\user2/.ssh/known_hosts:2 debug3: send packet: type 21 debug2: set_newkeys: mode 1 debug1: rekey after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug3: receive packet: type 21 debug1: SSH2_MSG_NEWKEYS received debug2: set_newkeys: mode 0 debug1: rekey after 134217728 blocks debug3: unable to connect to pipe \\\\.\\pipe\\openssh-ssh-agent, error: 2 debug1: pubkey_prepare: ssh_get_authentication_socket: No such file or directory debug2: key: C:\\Users\\user2/.ssh/id_rsa (000001AD8C68FE60) debug2: key: C:\\Users\\user2/.ssh/id_dsa (0000000000000000) debug2: key: C:\\Users\\user2/.ssh/id_ecdsa (0000000000000000) debug2: key: C:\\Users\\user2/.ssh/id_ed25519 (0000000000000000) debug2: key: C:\\Users\\user2/.ssh/id_xmss (0000000000000000) debug3: send packet: type 5 debug3: receive packet: type 7 debug1: SSH2_MSG_EXT_INFO received debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521> debug3: receive packet: type 6 debug2: service_accept: ssh-userauth debug1: SSH2_MSG_SERVICE_ACCEPT received debug3: send packet: type 50 debug3: receive packet: type 51 debug1: Authentications that can continue: publickey,password debug3: start over, passed a different list publickey,password debug3: preferred publickey,keyboard-interactive,password debug3: authmethod_lookup publickey debug3: remaining preferred: keyboard-interactive,password debug3: authmethod_is_enabled publickey debug1: Next authentication method: publickey debug1: Offering public key: RSA SHA256:V1bsjGlaK+VtByYnbnDLldurkjaTEVnn6uetr6YePAc C:\\Users\\user2/.ssh/id_rsa debug3: send_pubkey_test debug3: send packet: type 50 debug2: we sent a publickey packet, wait for reply debug3: receive packet: type 60 debug1: Server accepts key: pkalg rsa-sha2-512 blen 279 debug2: input_userauth_pk_ok: fp SHA256:V1bsjGlaK+VtByYnbnDLldurkjaTEVnn6uetr6YePAc debug3: sign_and_send_pubkey: RSA SHA256:V1bsjGlaK+VtByYnbnDLldurkjaTEVnn6uetr6YePAc debug3: send packet: type 50 debug3: receive packet: type 52 debug1: Authentication succeeded (publickey). Authenticated to ip ([ip]:22). debug1: channel 0: new [client-session] debug3: ssh_session2_open: channel_new: 0 debug2: channel 0: send open debug3: send packet: type 90 debug1: Requesting no-more-sessions@openssh.com debug3: send packet: type 80 debug1: Entering interactive session. debug1: pledge: network debug1: console supports the ansi parsing debug3: Successfully set console output code page from:936 to 65001 debug3: Successfully set console input code page from:936 to 65001 debug3: receive packet: type 80 debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 debug3: receive packet: type 91 debug2: channel_input_open_confirmation: channel 0: callback start debug2: fd 3 setting TCP_NODELAY debug2: client_session2_setup: id 0 debug2: channel 0: request pty-req confirm 1 debug3: send packet: type 98 debug2: channel 0: request shell confirm 1 debug3: send packet: type 98 debug2: channel_input_open_confirmation: channel 0: callback done debug2: channel 0: open confirm rwindow 0 rmax 32768 debug3: receive packet: type 99 debug2: channel_input_status_confirm: type 99 id 0 debug2: PTY allocation request accepted on channel 0 debug2: channel 0: rcvd adjust 2097152 debug3: receive packet: type 99 debug2: channel_input_status_confirm: type 99 id 0 debug2: shell request accepted on channel 0 Welcome to Ubuntu 18.04 LTS (GNU/Linux 4.15.0-106-generic x86_64) * Documentation: https://help.ubuntu.com * Management: https://landscape.canonical.com * Support: https://ubuntu.com/advantage * Canonical Livepatch is available for installation. - Reduce system reboots and improve kernel security. Activate at: https://ubuntu.com/livepatch 363 packages can be updated. 36 updates are security updates. *** System restart required *** Last login: Tue Sep 22 12:42:49 2020 from 192.168.40.18 user1@user1-X9DRL-3F-iF:~$ </details> **Same paste problem** # 2 Indirect entry: "commandline": "cmd.exe", then command “ssh -v -v -v user1@ip” **$ ssh -v -v -v user1@ip** <details> <summary>result</summary> OpenSSH_8.3p1, OpenSSL 1.1.1g 21 Apr 2020 debug1: Reading configuration data /c/Users/user2/.ssh/config debug1: /c/Users/user2/.ssh/config line 1: Applying options for ip debug1: Reading configuration data /etc/ssh/ssh_config debug2: resolve_canonicalize: hostname ip is address debug2: ssh_connect_direct debug1: Connecting to ip [ip] port 22. debug1: Connection established. debug1: identity file /c/Users/user2/.ssh/id_rsa type 0 debug1: identity file /c/Users/user2/.ssh/id_rsa-cert type -1 debug1: identity file /c/Users/user2/.ssh/id_dsa type -1 debug1: identity file /c/Users/user2/.ssh/id_dsa-cert type -1 debug1: identity file /c/Users/user2/.ssh/id_ecdsa type -1 debug1: identity file /c/Users/user2/.ssh/id_ecdsa-cert type -1 debug1: identity file /c/Users/user2/.ssh/id_ecdsa_sk type -1 debug1: identity file /c/Users/user2/.ssh/id_ecdsa_sk-cert type -1 debug1: identity file /c/Users/user2/.ssh/id_ed25519 type -1 debug1: identity file /c/Users/user2/.ssh/id_ed25519-cert type -1 debug1: identity file /c/Users/user2/.ssh/id_ed25519_sk type -1 debug1: identity file /c/Users/user2/.ssh/id_ed25519_sk-cert type -1 debug1: identity file /c/Users/user2/.ssh/id_xmss type -1 debug1: identity file /c/Users/user2/.ssh/id_xmss-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_8.3 debug1: Remote protocol version 2.0, remote software version OpenSSH_7.6p1 Ubuntu-4ubuntu0.3 debug1: match: OpenSSH_7.6p1 Ubuntu-4ubuntu0.3 pat OpenSSH_7.0*,OpenSSH_7.1*,OpenSSH_7.2*,OpenSSH_7.3*,OpenSSH_7.4*,OpenSSH_7.5*,OpenSSH_7.6*,OpenSSH_7.7* compat 0x04000002 debug2: fd 3 setting O_NONBLOCK debug1: Authenticating to ip:22 as 'user1' debug3: hostkeys_foreach: reading file "/c/Users/user2/.ssh/known_hosts" debug3: record_hostkey: found key type ECDSA in file /c/Users/user2/.ssh/known_hosts:2 debug3: load_hostkeys: loaded 1 keys from ip debug3: order_hostkeyalgs: prefer hostkeyalgs: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521 debug3: send packet: type 20 debug1: SSH2_MSG_KEXINIT sent debug3: receive packet: type 20 debug1: SSH2_MSG_KEXINIT received debug2: local client KEXINIT proposal debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,ext-info-c debug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,ssh-ed25519-cert-v01@openssh.com,sk-ssh-ed25519-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,sk-ecdsa-sha2-nistp256@openssh.com,ssh-ed25519,sk-ssh-ed25519@openssh.com,rsa-sha2-512,rsa-sha2-256,ssh-rsa debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,3des-cbc,aes256-cbc,aes192-cbc debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,3des-cbc,aes256-cbc,aes192-cbc debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 debug2: compression ctos: none,zlib@openssh.com,zlib debug2: compression stoc: none,zlib@openssh.com,zlib debug2: languages ctos: debug2: languages stoc: debug2: first_kex_follows 0 debug2: reserved 0 debug2: peer server KEXINIT proposal debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1 debug2: host key algorithms: ssh-rsa,rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519 debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 debug2: compression ctos: none,zlib@openssh.com debug2: compression stoc: none,zlib@openssh.com debug2: languages ctos: debug2: languages stoc: debug2: first_kex_follows 0 debug2: reserved 0 debug1: kex: algorithm: curve25519-sha256 debug1: kex: host key algorithm: ecdsa-sha2-nistp256 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none debug3: send packet: type 30 debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug3: receive packet: type 31 debug1: Server host key: ecdsa-sha2-nistp256 SHA256:zlHmnr6lkVxh6s6B2kZO/1qNsaaW4hJ3r3nPtfSefhE debug3: hostkeys_foreach: reading file "/c/Users/user2/.ssh/known_hosts" debug3: record_hostkey: found key type ECDSA in file /c/Users/user2/.ssh/known_hosts:2 debug3: load_hostkeys: loaded 1 keys from ip debug1: Host 'ip' is known and matches the ECDSA host key. debug1: Found key in /c/Users/user2/.ssh/known_hosts:2 debug3: send packet: type 21 debug2: set_newkeys: mode 1 debug1: rekey out after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug3: receive packet: type 21 debug1: SSH2_MSG_NEWKEYS received debug2: set_newkeys: mode 0 debug1: rekey in after 134217728 blocks debug1: Will attempt key: /c/Users/user2/.ssh/id_rsa RSA SHA256:V1bsjGlaK+VtByYnbnDLldurkjaTEVnn6uetr6YePAc debug1: Will attempt key: /c/Users/user2/.ssh/id_dsa debug1: Will attempt key: /c/Users/user2/.ssh/id_ecdsa debug1: Will attempt key: /c/Users/user2/.ssh/id_ecdsa_sk debug1: Will attempt key: /c/Users/user2/.ssh/id_ed25519 debug1: Will attempt key: /c/Users/user2/.ssh/id_ed25519_sk debug1: Will attempt key: /c/Users/user2/.ssh/id_xmss debug2: pubkey_prepare: done debug3: send packet: type 5 debug3: receive packet: type 7 debug1: SSH2_MSG_EXT_INFO received debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521> debug3: receive packet: type 6 debug2: service_accept: ssh-userauth debug1: SSH2_MSG_SERVICE_ACCEPT received debug3: send packet: type 50 debug3: receive packet: type 51 debug1: Authentications that can continue: publickey,password debug3: start over, passed a different list publickey,password debug3: preferred publickey,keyboard-interactive,password debug3: authmethod_lookup publickey debug3: remaining preferred: keyboard-interactive,password debug3: authmethod_is_enabled publickey debug1: Next authentication method: publickey debug1: Offering public key: /c/Users/user2/.ssh/id_rsa RSA SHA256:V1bsjGlaK+VtByYnbnDLldurkjaTEVnn6uetr6YePAc debug3: send packet: type 50 debug2: we sent a publickey packet, wait for reply debug3: receive packet: type 60 debug1: Server accepts key: /c/Users/user2/.ssh/id_rsa RSA SHA256:V1bsjGlaK+VtByYnbnDLldurkjaTEVnn6uetr6YePAc debug3: sign_and_send_pubkey: RSA SHA256:V1bsjGlaK+VtByYnbnDLldurkjaTEVnn6uetr6YePAc debug3: sign_and_send_pubkey: signing using rsa-sha2-512 SHA256:V1bsjGlaK+VtByYnbnDLldurkjaTEVnn6uetr6YePAc debug3: send packet: type 50 debug3: receive packet: type 52 debug1: Authentication succeeded (publickey). Authenticated to ip ([ip]:22). debug1: channel 0: new [client-session] debug3: ssh_session2_open: channel_new: 0 debug2: channel 0: send open debug3: send packet: type 90 debug1: Requesting no-more-sessions@openssh.com debug3: send packet: type 80 debug1: Entering interactive session. debug1: pledge: network debug3: receive packet: type 80 debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 debug3: receive packet: type 91 debug2: channel_input_open_confirmation: channel 0: callback start debug2: fd 3 setting TCP_NODELAY debug3: ssh_packet_set_tos: set IP_TOS 0x48 debug2: client_session2_setup: id 0 debug2: channel 0: request pty-req confirm 1 debug3: send packet: type 98 debug2: channel 0: request shell confirm 1 debug3: send packet: type 98 debug2: channel_input_open_confirmation: channel 0: callback done debug2: channel 0: open confirm rwindow 0 rmax 32768 debug3: receive packet: type 99 debug2: channel_input_status_confirm: type 99 id 0 debug2: PTY allocation request accepted on channel 0 debug2: channel 0: rcvd adjust 2097152 debug3: receive packet: type 99 debug2: channel_input_status_confirm: type 99 id 0 debug2: shell request accepted on channel 0 Welcome to Ubuntu 18.04 LTS (GNU/Linux 4.15.0-106-generic x86_64) * Documentation: https://help.ubuntu.com * Management: https://landscape.canonical.com * Support: https://ubuntu.com/advantage * Canonical Livepatch is available for installation. - Reduce system reboots and improve kernel security. Activate at: https://ubuntu.com/livepatch 363 packages can be updated. 36 updates are security updates. *** System restart required *** Last login: Tue Sep 22 12:42:27 2020 from 192.168.40.18 user1@user1-X9DRL-3F-iF:~$ </details> **No paste problem** # 3 Keyboard layout Only Microsoft Pinyin
Author
Owner

@DHowett commented on GitHub (Sep 22, 2020):

In v mode, are there any extra messages before the crash?

@DHowett commented on GitHub (Sep 22, 2020): In `v` mode, are there any extra messages before the crash?
Author
Owner

@Z-LL commented on GitHub (Sep 22, 2020):

In v mode, are there any extra messages before the crash?

I commented "closeOnExit": "always", ans get the following result:

debug3: send - ERROR: Unexpected IO state, io:00000216D927FB10
packet_write_poll: Connection to IP port 22: eother
debug3: Successfully set console output code page from 65001 to 936
debug3: Successfully set console input code page from 65001 to 936

I test it many times, the 00000216D927FB10 is different every time, the others are the same

@Z-LL commented on GitHub (Sep 22, 2020): > In `v` mode, are there any extra messages before the crash? I commented "closeOnExit": "always", ans get the following result: ``` debug3: send - ERROR: Unexpected IO state, io:00000216D927FB10 packet_write_poll: Connection to IP port 22: eother debug3: Successfully set console output code page from 65001 to 936 debug3: Successfully set console input code page from 65001 to 936 ``` I test it many times, the `00000216D927FB10` is different every time, the others are the same
Author
Owner

@aesm1p commented on GitHub (Sep 24, 2020):

I also did the same test with CMD.exe and found that the copy operation will still quit,so maybe this is a bug in ssh.exe or the system settings, not windows terminal.

@aesm1p commented on GitHub (Sep 24, 2020): I also did the same test with CMD.exe and found that the copy operation will still quit,so maybe this is a bug in ssh.exe or the system settings, not windows terminal.
Author
Owner

@DHowett commented on GitHub (Sep 25, 2020):

Wow! Thank you for testing that.

Based on that message, it looks like the code in ssh that handles "partial send" (when you give it too much input at one time, it has to send part of it now and part of it later) on Windows is broken.

This would be a good bug to file on the win32-openssh GitHub.

Thank you again.

@DHowett commented on GitHub (Sep 25, 2020): Wow! Thank you for testing that. Based on that message, it looks like the code in ssh that handles "partial send" (when you give it too much input at one time, it has to send part of it now and part of it later) on Windows is broken. This would be a good bug to file on [the win32-openssh GitHub](https://github.com/PowerShell/Win32-OpenSSH). Thank you again.
Author
Owner

@Z-LL commented on GitHub (Nov 10, 2020):

I find a solution!
The openssh version of windows is 7.x. I uninstalled the openssh that comes with win10 and switched to git ssh. There is no such problem!

The current version of openssh on win10:
OpenSSH_8.3p1, OpenSSL 1.1.1g 21 Apr 2020

@Z-LL commented on GitHub (Nov 10, 2020): I find a solution! The openssh version of windows is 7.x. I uninstalled the openssh that comes with win10 and switched to git ssh. There is no such problem! The current version of openssh on win10: OpenSSH_8.3p1, OpenSSL 1.1.1g 21 Apr 2020
Author
Owner

@gitsang commented on GitHub (Nov 8, 2021):

image

solved by using git's ssh

@gitsang commented on GitHub (Nov 8, 2021): ![image](https://user-images.githubusercontent.com/49085035/140679092-96be4bf5-1127-43db-91c9-ffa8cd34d906.png) solved by using git's ssh
Sign in to join this conversation.
1 Participants
Notifications
Due Date
No due date set.
Dependencies

No dependencies set.

Reference: starred/terminal#10587