Menu

#77 Can't connect to any remote SSH/SFTP servers

LINUX
open
None
1
2021-06-21
2016-01-14
reaxion
No

I can't connect to any remote SSH servers. When setting up a new project on a clean, fully updated copy of Windows 7, I receive the following error message when I try to test a connection to an SSH/SFTP server:

The server in question is a Debian Jessie (8.2) server. Is this something I'm missing on my system?

Additionally, I notice on installation this application hijacks my .sln file associations from Visual Studio. It should really ask me before it does something that drastic!

Discussion

  • Joshua Lumley

    Joshua Lumley - 2016-02-18

    You need to click 'next' to bring up the additional fields 'Link type' and 'Server'. You need to choose the right type of server. In my case I was using a rapsberry pi and the server was LINUX (Debian).

    It took me about 30 tries to get the right, BVRDE crashed about 10 times but onces you get the right combination remember to take a screenshot to remember it.

     
    • Andrey Zibrov

      Andrey Zibrov - 2016-03-29

      it seems that the problem is in current realization of OpenSSH (6.7)

      Please look at this link:
      http://stackoverflow.com/questions/26424621/algorithm-negotiation-fail-ssh-in-jenkins
      Matthieu Wipliez did the trick.

      this is the end of sshd_config which works for current version of bvrde 1.3a (cryptlib 3.3.0)

      Ciphers 3des-cbc,blowfish-cbc,cast128-cbc,arcfour,arcfour128,arcfour256,aes128-cbc,aes192-cbc,aes256-cbc
      MACs hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160
      KexAlgorithms curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1

       
  • Dmitri

    Dmitri - 2019-01-27

    Situation is even worse -- even the latest cryptlib 3441 does not support aes*-ctr ciphers, so the IDE with built-in ssh/sftp won't work with any recent linux distro that is shipped with openssh built wihtout openssl because such sshd won't offer any ciphers other than aes*-ctr and some thing called chacha. I discovered this problem by debugging the IDE -- the following lines is where this error is obtained from criptolib:
    CHAR szError[200] = { 0 };
    int ccbSize = sizeof(szError) - 1;
    clib.cryptGetAttributeString(cryptSession, CRYPT_ATTRIBUTE_ERRORMESSAGE, szError, &ccbSize);
    then it is even distributed among subscribers using m_pCallback->BroadcastLine(VT100_RED, ...) call, but seems there are no subscribers. So what you get is generic error based on some sort of cryptlib errorcode to win32 errorcode translation.

    Are there any plans to switch to libssh2 which seems to support ssh communication much better?

     
  • Dmitri

    Dmitri - 2019-01-29

    openssh sources:
    https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/cipher.c?rev=1.112&content-type=text/x-cvsweb-markup
    see how ciphers are defined:

    static const struct sshcipher ciphers[] = {

    #ifdef WITH_OPENSSL
        { "3des-cbc",       8, 24, 0, 0, CFLAG_CBC, EVP_des_ede3_cbc },
        { "aes128-cbc",     16, 16, 0, 0, CFLAG_CBC, EVP_aes_128_cbc },
        { "aes192-cbc",     16, 24, 0, 0, CFLAG_CBC, EVP_aes_192_cbc },
        { "aes256-cbc",     16, 32, 0, 0, CFLAG_CBC, EVP_aes_256_cbc },
        { "rijndael-cbc@lysator.liu.se",
                    16, 32, 0, 0, CFLAG_CBC, EVP_aes_256_cbc },
        { "aes128-ctr",     16, 16, 0, 0, 0, EVP_aes_128_ctr },
        { "aes192-ctr",     16, 24, 0, 0, 0, EVP_aes_192_ctr },
        { "aes256-ctr",     16, 32, 0, 0, 0, EVP_aes_256_ctr },
        { "aes128-gcm@openssh.com",
                    16, 16, 12, 16, 0, EVP_aes_128_gcm },
        { "aes256-gcm@openssh.com",
                    16, 32, 12, 16, 0, EVP_aes_256_gcm },
    #else
        { "aes128-ctr",     16, 16, 0, 0, CFLAG_AESCTR, NULL },
        { "aes192-ctr",     16, 24, 0, 0, CFLAG_AESCTR, NULL },
        { "aes256-ctr",     16, 32, 0, 0, CFLAG_AESCTR, NULL },
    #endif
        { "chacha20-poly1305@openssh.com",
                    8, 64, 0, 16, CFLAG_CHACHAPOLY, NULL },
        { "none",       8, 0, 0, 0, CFLAG_NONE, NULL },
    
        { NULL,         0, 0, 0, 0, 0, NULL }
    };
    

    so if it's compiled without WITH_OPENSSL, the only ciphers are aes*-ctr

    The following discussion sounds like CTR and openssh's own implementation of GCM will be the only block ciphers available in FIPS 140-2 compliant openssh based systems
    https://www.linuxquestions.org/questions/linux-security-4/what-steps-do-i-take-to-make-my-openssh-server-fips-140-2-compliant-4175619523/

     
  • Bjarke Viksøe

    Bjarke Viksøe - 2019-02-08

    Hi,

    Thanks for the info.
    It looks like Cryptlib authors are aware of the aes-ctr being problematic, but I am not sure what the status really is for its support. In the Cryptlib ssh2_cry.c source file I found the following comment:

    /* Some versions of SSH want to use AES-CTR instead of AES-CBC, which is a 
       pain to deal with because it's not a standard encryption mode for
       cryptlib (or much of anything else).  To deal with this we synthesise it
       from ECB mode */
    

    If I understand correct, the initial problem described in the top of this thread has been resolved, and your problem is related only to linux versions that have a stripped sshd. Or do you have popular LINUX distribution that exhibit this problem?

    Maybe it is time to investigate how much work it is to transition to libssh or openssh libraries in BVRDE.

    regards
    bjarke

     
    • Jürgen Eberlein

      My company won't allow other KexAlgorithms in sshd_config due to security reasons.
      Any other solutions/workarounds/updates?

       
  • Dmitri

    Dmitri - 2019-02-08

    bjarke,

    It is CentOS 7.6 running the latest opensshd. It's possible that the configuration is altered to disable the other cyphers, or it's just binary compiled without WITH_OPENSSL option.

    As of Cryptlib - I contacted author and sent him patch that makes AES-CTR available for SSH connections. With versions up to 3.4.4.1 it's not available.
    Author replied that he is aware of that problem and already got his own fix. It's unclearthough whether and when he's going to publish it.

     
  • Balazs Szekely

    Balazs Szekely - 2021-05-14

    Hello
    In my clone of DVRDE 1.4 (see also https://sourceforge.net/p/bvrde/discussion/373758/thread/121f949328/), I've changed the SSH engine from cryptlib to libssh, and it supports the latest ciphers also, so no SSH connectivity issues. Let me know if you are interested.

     
    ❤️
    1
    • Amar Panda

      Amar Panda - 2021-06-20

      Sir, would you mind sharing your version/Clone of BVRDE 1.4 with me please ? As I have indicated in the issue I have raised recently, I am having trouble connecting to my Ubuntu (WSL) from Windows 10 through sftp/ssh. Can you pls help ?
      Thank You.

       
  • Amar Panda

    Amar Panda - 2021-06-20

    @Balazs Szekely, Sir, would you mind sharing your version/Clone of BVRDE 1.4 with me please ? As I have indicated in the issue I have raised recently, I am having trouble connecting to my Ubuntu (WSL) from Windows 10 through sftp/ssh. Can you pls help ?
    Thank You.

     
  • Balazs Szekely

    Balazs Szekely - 2021-06-20
     
    • Amar Panda

      Amar Panda - 2021-06-21

      Thank you so much Sir...I tried your version of BVRDE from the above link and it Works just fine without any SSH issues. Thank you once again...Just to let everyone else know that you need to Install MS Visual C++ 2008 SP1 (Redistributable) package for this version of BVRDE to work on Windows 10.

       
      • Balazs Szekely

        Balazs Szekely - 2021-06-21

        Hello
        The VS2008 redistributables are included in the zip, in the \Redist directory.
        The shared version contains all my improvements for the last 14+ years, on top of original version 1.4, as I've already mentioned in https://sourceforge.net/p/bvrde/discussion/373758/thread/121f949328/

         

Log in to post a comment.

MongoDB Logo MongoDB