We are experiencing a weird situation.
Here is the relevant log when we SSH using JSch 1.5 to SCO OpenServer(TM)
Release 6.0.0
==================
SessionFactory.makeObject()
Connecting to xxxxxx.xxxxxxxx.xxx port 22
Connection established
Remote version string: SSH-2.0-OpenSSH_4.6
Local version string: SSH-2.0-JSCH-0.1.50
CheckCiphers:
aes256-ctr,aes192-ctr,aes128-ctr,aes256-cbc,aes192-cbc,aes128-cbc,3des-ctr,arcfour,arcfour128,arcfour256
aes256-ctr is not available.
aes192-ctr is not available.
aes256-cbc is not available.
aes192-cbc is not available.
arcfour256 is not available.
CheckKexes: diffie-hellman-group14-sha1
diffie-hellman-group14-sha1 is not available.
SSH_MSG_KEXINIT sent
SSH_MSG_KEXINIT received
kex: server:
diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
kex: server: ssh-rsa,ssh-dss
kex: server:
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,
rijndael-...@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
kex: server:
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,
rijndael-...@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
kex: server: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd...@openssh.com
,hmac-sha1-96,hmac-md5-96
kex: server: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd...@openssh.com
,hmac-sha1-96,hmac-md5-96
kex: server: none,z...@openssh.com,zlib
kex: server: none,z...@openssh.com,zlib
kex: server:
kex: server:
kex: client: diffie-hellman-group1-sha1,diffie-hellman-group-exchange-sha1
kex: client: ssh-rsa,ssh-dss
kex: client: aes128-ctr,aes128-cbc,3des-ctr,3des-cbc,blowfish-cbc
kex: client: aes128-ctr,aes128-cbc,3des-ctr,3des-cbc,blowfish-cbc
kex: client: hmac-md5,hmac-sha1,hmac-sha2-256,hmac-sha1-96,hmac-md5-96
kex: client: hmac-md5,hmac-sha1,hmac-sha2-256,hmac-sha1-96,hmac-md5-96
kex: client: none
kex: client: none
kex: client:
kex: client:
kex: server->client aes128-ctr hmac-md5 none
kex: client->server aes128-ctr hmac-md5 none
SSH_MSG_KEXDH_INIT sent
expecting SSH_MSG_KEXDH_REPLY
ssh_rsa_verify: signature true
Permanently added 'xxxxx.xxxxxx.xxx' (RSA) to the list of known hosts.
SSH_MSG_NEWKEYS sent
SSH_MSG_NEWKEYS received
SSH_MSG_SERVICE_REQUEST sent
SSH_MSG_SERVICE_ACCEPT received
Authentications that can continue: publickey,keyboard-interactive,password
Next authentication method: publickey
Authentications that can continue: password
Next authentication method: password
Authentication succeeded (password).
SessionFactory.makeObject() exit
WARNING: Your password has expired.
Password change required but no TTY available.
alResponse[null]
=========================================================================================
Notice the second to last line. "Password change required but no TTY
available."
We reset the password. Try again. It works the first time but the warning
reappears immediately afterwords.
We noticed that the shadow password file gets deleted on the server after
first login resulting in the warning on subsequent attempts.
We are using Jakarta Commons Pooling to create a pool of JSch sessions.
Logs for SessionFactory.makeObject() refers to the pool access.
Ideas anyone? We are also in the process of contacting SCO Unix support in
the meanwhile.
------------------------------------------------------------------------------
Rapidly troubleshoot problems before they affect your business. Most IT
organizations don't have a clear picture of how application performance
affects their revenue. With AppDynamics, you get 100% visibility into your
Java,.NET, & PHP application. Start your 15-day FREE TRIAL of AppDynamics Pro!
http://pubads.g.doubleclick.net/gampad/clk?id=84349831&iu=/4140/ostg.clktrk
_______________________________________________
JSch-users mailing list
JSch-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/jsch-users