Further problem... after all the 1000's of authentication guesses, the
server stops responding. I'm scouring my code to see if it's on my side,
but I feel the issue is I'm not doing the server-side disconnect
correctly and leaving open resources to accumulate and become exhausted.


My disconnect-timeout procedure:
if ActiveChannel <> nil then
begin
 ssh_channel_send_eof(ActiveChannel);
 ssh_channel_close(ActiveChannel);
 Sleep(1000);
end;
ssh_disconnect(Session);
ssh_free(Session);
There may be other channels getting left open? Should ssh_disconnect()
pull the plug on all of them? The server is "stuck" right now and not answering new clients. Log:
[2025/05/26 22:05:41.429682, 4] ssh_socket_pollcallback: Poll callback
on socket 1056 (POLLIN POLLOUT ), out buffer 22
[2025/05/26 22:05:41.429682, 3] ssh_socket_pollcallback: Received
POLLOUT in connecting state
[2025/05/26 22:05:41.429682, 4] ssh_socket_pollcallback: Poll callback
on socket 1056 (POLLIN POLLOUT ), out buffer 22
[2025/05/26 22:05:41.429682, 3] callback_receive_banner: Received
banner: SSH-2.0-libssh_0.7.4
[2025/05/26 22:05:41.429682, 2] ssh_server_connection_callback: SSH
client banner: SSH-2.0-libssh_0.7.4
[2025/05/26 22:05:41.429682, 2] ssh_analyze_banner: Analyzing banner:
SSH-2.0-libssh_0.7.4
[2025/05/26 22:05:41.429682, 4] ssh_list_kex: kex algos:
curve25519-sha256,curve25519-sha...@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group18-sha512,diffie-hellman-group16-sha512,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
[2025/05/26 22:05:41.429682, 4] ssh_list_kex: server host key algo:
rsa-sha2-512,rsa-sha2-256,ssh-rsa
[2025/05/26 22:05:41.429682, 4] ssh_list_kex: encryption client->server:
aes256-...@openssh.com,aes128-...@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr,aes256-cbc,aes192-cbc,aes128-cbc,3des-cbc
[2025/05/26 22:05:41.429682, 4] ssh_list_kex: encryption server->client:
aes256-...@openssh.com,aes128-...@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr,aes256-cbc,aes192-cbc,aes128-cbc,3des-cbc
[2025/05/26 22:05:41.429682, 4] ssh_list_kex: mac algo client->server:
hmac-sha2-256-...@openssh.com,hmac-sha2-512-...@openssh.com,hmac-sha1-...@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
[2025/05/26 22:05:41.429682, 4] ssh_list_kex: mac algo server->client:
hmac-sha2-256-...@openssh.com,hmac-sha2-512-...@openssh.com,hmac-sha1-...@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
[2025/05/26 22:05:41.429682, 4] ssh_list_kex: compression algo
client->server: none
[2025/05/26 22:05:41.429682, 4] ssh_list_kex: compression algo
server->client: none
[2025/05/26 22:05:41.429682, 4] ssh_list_kex: languages client->server:
[2025/05/26 22:05:41.445275, 4] ssh_list_kex: languages server->client:
[2025/05/26 22:05:41.445275, 3] packet_send2: packet: wrote [type=20,
len=884, padding_size=9, comp=874, payload=874]
[2025/05/26 22:05:41.445275, 3] ssh_send_kex: SSH_MSG_KEXINIT sent
[2025/05/26 22:05:41.445275, 3] ssh_socket_unbuffered_write: Enabling
POLLOUT for socket
[2025/05/26 22:05:41.445275, 4] ssh_socket_pollcallback: Poll callback
on socket 1056 (POLLOUT ), out buffer 0
[2025/05/26 22:05:41.445275, 4] ssh_socket_pollcallback: sending control
flow event
[2025/05/26 22:05:41.445275, 4] ssh_packet_socket_controlflow_callback:
sending channel_write_wontblock callback
Past this radio-silence. I'm assuming error in my code for now

Reply via email to