I am having trouble using F-Secure ssh from a Cygwin xterm. It works from a Cygwin bash shell, but not from an xterm. Which is what lead me to believe it is an XWin issue. Here are all of the software versions I am using in my xterm...
Welcome to the XWin X Server Vendor: The Cygwin/X Project Release: 6.8.1.0-8 $ xterm -v Cygwin 6.8.1.0(196) $ ssh -V c:\PROGRA~1\F-Secure\Ssh\ssh2.exe: F-Secure SSH Windows Client 5.3 Build 23 bash --version GNU bash, version 2.05b.0(1)-release (i686-pc-cygwin) Copyright (C) 2002 Free Software Foundation, Inc. Here is the debug output from ssh... $ ssh -d 4 netxsd02 ssh -d 4 netxsd02 debug: Ssh2: User config file not found, using defaults. (Looked for 'C:/Documents and Settings/mheath.AABBAS04/Application Data/F-Secure SSH/ssh2_config') debug: Ssh2: remote host = "netxsd02" debug: SshCertEdb: EDB: Adding database: ssh.http debug: SshCertEdb: EDB: Removing database: ssh.ldap debug: SshCertEdb: EDB: Adding database: ssh.ldap debug: Connecting to netxsd02, port 22... (SOCKS not used) debug: Ssh2: Entering event loop. debug: Ssh2Client: Creating transport protocol. debug: Ssh2Transport: Setting new keys and algorithms debug: Ssh2Transport: Allocating cipher: name: none, key_len: 16. debug: Ssh2Transport: Setting new keys and algorithms debug: Ssh2Transport: Allocating cipher: name: none, key_len: 16. debug: Ssh2Transport: My version: SSH-1.99-3.2.3 F-Secure SSH Windows Client debug: SshAuthMethodClient: Added "keyboard-interactive" to usable methods. debug: SshAuthMethodClient: Added "publickey" to usable methods. debug: SshAuthMethodClient: Added "password" to usable methods. debug: Ssh2Client: Creating userauth protocol. debug: client supports 3 auth methods: 'keyboard-interactive,publickey,password' debug: Ssh2Common: local ip = 113.128.163.180, local port = 1104 debug: Ssh2Common: remote ip = 113.128.128.139, remote port = 22 debug: Ssh2Common: Creating connection protocol. debug: SshConnection: Wrapping... debug: SshTcp: Destroying ConnectContext... debug: Remote version: SSH-2.0-3.1.0 F-SECURE SSH debug: Major: 3 Minor: 1 Revision: 0 debug: Ssh2Transport: Remote version calls "[EMAIL PROTECTED]" "des-cbc". debug: Ssh2Transport: Constructing the first key exchange packet. debug: SshProtoTrKex: Making first key exchange packet. debug: Ssh2Transport: 3des-cbc,aes256-cbc,aes192-cbc,aes128-cbc,blowfish-cbc,twofish-cbc,twofish256-cbc,twofish192-cbc,twofish128-cbc,cast128-cbc,arcfour debug: Ssh2Transport: 3des-cbc,aes256-cbc,aes192-cbc,aes128-cbc,blowfish-cbc,twofish-cbc,twofish256-cbc,twofish192-cbc,twofish128-cbc,cast128-cbc,arcfour debug: Ssh2Transport: local kexinit: first_packet_follows = TRUE debug: Ssh2Transport: Processing received SSH_MSG_KEXINIT. debug: Ssh2Transport: Computing algorithms from key exchange. debug: Ssh2Transport: client: kex = diffie-hellman-group1-sha1, hk_alg = ssh-dss,ssh-rsa,x509v3-sign-dss,x509v3-sign-rsa debug: Ssh2Transport: server: kex = diffie-hellman-group1-sha1, hk_alg = ssh-dss debug: Ssh2Transport: lang s to c: `', lang c to s: `' debug: Ssh2Transport: first_kex_packet_follows: FALSE debug: Ssh2Transport: c_to_s: cipher 3des-cbc, mac hmac-sha1, compression none debug: Ssh2Transport: s_to_c: cipher 3des-cbc, mac hmac-sha1, compression none debug: Ssh2Transport: Chosen host key algorithm: ssh-dss, Chosen kex algorithm: diffie-hellman-group1-sha1, Guessed right debug: Ssh2Client: Got key of type ssh-dss debug: Remote host key found from database. debug: Ssh2Transport: Setting new keys and algorithms debug: Ssh2Transport: Allocating cipher: name: 3des-cbc, key_len: 24. debug: Ssh2Transport: Sending service request for "ssh-userauth". debug: Ssh2Transport: Receiving SSH_MSG_NEWKEYS. debug: Ssh2Transport: Setting new keys and algorithms debug: Ssh2Transport: Allocating cipher: name: 3des-cbc, key_len: 24. debug: Ssh2Transport: Waiting for a service accept packet. debug: Ssh2Transport: Waiting for a service accept packet. debug: Ssh2Transport: Received SSH_MSG_SERVICE_ACCEPT with service name "ssh-userauth". debug: Ssh2Transport: Sending startup packet to application layer. debug: Ssh2Transport: Sending algorithms to application layer. debug: Ssh2Common: Received SSH_CROSS_STARTUP packet from connection protocol. debug: Ssh2Common: Received SSH_CROSS_ALGORITHMS packet from connection protocol. *****PROPRIETARY NOTICE***** This system is intended to be used solely by authorized users in the course of legitimate corporate business. Users are monitored to the extent necessary. BY ACCESSING THIS SYSTEM, YOU ARE CONSENTING TO THIS MONITORING.***** debug: server offers auth methods 'publickey,password'. debug: Ssh2AuthPubKeyClient: Starting pubkey auth... debug: Ssh2AuthPubKeyClient: ssh_client_auth_pubkey_agent_open_complete agent=0x0 debug: Ssh2AuthPubKeyClient: Agent is not running. debug: Ssh2AuthPubKeyClient: Got 0 keys from the agent. debug: Ssh2AuthPubKeyClient: Waiting for external keys. 0 seconds gone. debug: Ssh2AuthPubKeyClient: Waiting for external keys. 0 seconds gone. debug: SshUnixUserFiles: Found 1 keys from C:\Documents and Settings\mheath.AABBAS04\Application Data\F-Secure SSH\userkeys debug: SshUnixUserFiles: Found 0 certificates from C:\Documents and Settings\mheath.AABBAS04\Application Data\F-Secure SSH\UserCertificates debug: Ssh2AuthPubKeyClient: adding keyfile "C:\Documents and Settings\mheath.AABBAS04\Application Data\F-Secure SSH\userkeys\lumpkey" to candidates debug: Ssh2AuthPubKeyClient: Trying 1 key candidates. debug: Constructing and sending signature in publickey authentication. debug: Ssh2AuthPubKeyClient: reading private key C:\Documents and Settings\mheath.AABBAS04\Application Data\F-Secure SSH\userkeys\lumpkey debug: Ssh2AuthPubKeyClient: Public key authentication was successful. debug: Ssh2Common: Received SSH_CROSS_AUTHENTICATED packet from connection protocol. debug: SshStdioStream: stdio stream 99fe68 is being destroyed. debug: SshStdioStream: stdio stream 99fe68 was destroyed. debug: Ssh2: forward_x11 = FALSE, forward_agent = FALSE debug: SshStdioStream: stdin reader thread starts to read stdin. --[Hangs Here, goes no further]- Any help would greatly be appreciated. -Mike Heath