无法从同一局域网通过 ssh 登录

无法从同一局域网通过 ssh 登录

我在同一个 VLAN 上有两台 CentOS7 服务器。我可以从源服务器 ping 目标,但无法 ssh 到目标:

source # ping -c5 destination
PING 172.16.15.101 (172.16.15.101) 56(84) bytes of data.
64 bytes from 172.16.15.101: icmp_seq=1 ttl=64 time=0.301 ms
64 bytes from 172.16.15.101: icmp_seq=2 ttl=64 time=0.331 ms
64 bytes from 172.16.15.101: icmp_seq=3 ttl=64 time=0.359 ms
64 bytes from 172.16.15.101: icmp_seq=4 ttl=64 time=0.359 ms
64 bytes from 172.16.15.101: icmp_seq=5 ttl=64 time=0.367 ms

--- 172.16.15.101 ping statistics ---
5 packets transmitted, 5 received, 0% packet loss, time 3999ms
rtt min/avg/max/mdev = 0.301/0.343/0.367/0.029 ms

source # traceroute destination
traceroute to 172.16.15.101 (172.16.15.101), 30 hops max, 60 byte packets
 1  destination (172.16.15.101)  0.260 ms  0.332 ms  0.317 ms

source # : < /dev/tcp/destination/ssh
source # echo $?
0
source # time timeout 30s ssh destination

real    0m30.002s
user    0m0.004s
sys     0m0.006s
source # echo $?
124

尽管目标服务器上没有 iptables 规则:

destination # iptables -L
Chain INPUT (policy ACCEPT)
target     prot opt source               destination

Chain FORWARD (policy ACCEPT)
target     prot opt source               destination

Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination

destination # systemctl status sshd
● sshd.service - OpenSSH server daemon
   Loaded: loaded (/usr/lib/systemd/system/sshd.service; enabled; vendor preset: enabled)
   Active: active (running) since Wed 2023-01-11 16:21:02 CET; 28min ago
     Docs: man:sshd(8)
           man:sshd_config(5)
 Main PID: 2581 (sshd)
   CGroup: /system.slice/sshd.service
           └─2581 /usr/sbin/sshd -D

Jan 11 16:21:02 destination systemd[1]: Starting OpenSSH server daemon...
Jan 11 16:21:02 destination sshd[2581]: Server listening on 0.0.0.0 port 22.
Jan 11 16:21:02 destination sshd[2581]: Server listening on :: port 22.
Jan 11 16:21:02 destination systemd[1]: Started OpenSSH server daemon.

EDIT0:/etc/hosts.allow/etc/hosts.deny包含注释:

destination # egrep -v "^(#|$)" /etc/hosts.allow /etc/hosts.deny
destination #
source # ssh -vv destination
OpenSSH_7.4p1, OpenSSL 1.0.2k-fips  26 Jan 2017
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: /etc/ssh/ssh_config line 58: Applying options for *
debug2: resolving "pan-scal-wit01" port 22
debug2: ssh_connect_direct: needpriv 0
debug1: Connecting to pan-scal-wit01 [172.16.15.101] port 22.
debug1: Connection established.
debug1: permanently_set_uid: 0/0
debug1: identity file /root/.ssh/id_rsa type 1
debug1: key_load_public: No such file or directory
debug1: identity file /root/.ssh/id_rsa-cert type -1
debug1: key_load_public: No such file or directory
debug1: identity file /root/.ssh/id_dsa type -1
debug1: key_load_public: No such file or directory
debug1: identity file /root/.ssh/id_dsa-cert type -1
debug1: key_load_public: No such file or directory
debug1: identity file /root/.ssh/id_ecdsa type -1
debug1: key_load_public: No such file or directory
debug1: identity file /root/.ssh/id_ecdsa-cert type -1
debug1: key_load_public: No such file or directory
debug1: identity file /root/.ssh/id_ed25519 type -1
debug1: key_load_public: No such file or directory
debug1: identity file /root/.ssh/id_ed25519-cert type -1
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_7.4
debug1: Remote protocol version 2.0, remote software version OpenSSH_7.4
debug1: match: OpenSSH_7.4 pat OpenSSH* compat 0x04000000
debug2: fd 3 setting O_NONBLOCK
debug1: Authenticating to pan-scal-wit01:22 as 'root'
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug2: local client KEXINIT proposal
debug2: KEX algorithms: curve25519-sha256,[email protected],ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1,ext-info-c
debug2: host key algorithms: [email protected],[email protected],[email protected],[email protected],[email protected],[email protected],ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ssh-dss
debug2: ciphers ctos: [email protected],aes128-ctr,aes192-ctr,aes256-ctr,[email protected],[email protected],aes128-cbc,aes192-cbc,aes256-cbc
debug2: ciphers stoc: [email protected],aes128-ctr,aes192-ctr,aes256-ctr,[email protected],[email protected],aes128-cbc,aes192-cbc,aes256-cbc
debug2: MACs ctos: [email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: MACs stoc: [email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: compression ctos: none,[email protected],zlib
debug2: compression stoc: none,[email protected],zlib
debug2: languages ctos:
debug2: languages stoc:
debug2: first_kex_follows 0
debug2: reserved 0
debug2: peer server KEXINIT proposal
debug2: KEX algorithms: curve25519-sha256,[email protected],ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
debug2: host key algorithms: ssh-rsa,rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519
debug2: ciphers ctos: [email protected],aes128-ctr,aes192-ctr,aes256-ctr,[email protected],[email protected],aes128-cbc,aes192-cbc,aes256-cbc,blowfish-cbc,cast128-cbc,3des-cbc
debug2: ciphers stoc: [email protected],aes128-ctr,aes192-ctr,aes256-ctr,[email protected],[email protected],aes128-cbc,aes192-cbc,aes256-cbc,blowfish-cbc,cast128-cbc,3des-cbc
debug2: MACs ctos: [email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: MACs stoc: [email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: compression ctos: none,[email protected]
debug2: compression stoc: none,[email protected]
debug2: languages ctos:
debug2: languages stoc:
debug2: first_kex_follows 0
debug2: reserved 0
debug1: kex: algorithm: curve25519-sha256
debug1: kex: host key algorithm: ecdsa-sha2-nistp256
debug1: kex: server->client cipher: [email protected] MAC: <implicit> compression: none
debug1: kex: client->server cipher: [email protected] MAC: <implicit> compression: none
debug1: kex: curve25519-sha256 need=64 dh_need=64
debug1: kex: curve25519-sha256 need=64 dh_need=64
debug1: expecting SSH2_MSG_KEX_ECDH_REPLY

答案1

根据它的坚持expecting SSH2_MSG_KEX_ECDH_REPLY,我在这里找到了类似的回复:https://serverfault.com/questions/210408/cannot-ssh-debug1-expecting-ssh2-msg-kex-dh-gex-reply/848953#848953

看起来您可以通过指定密钥交换的一部分来解决有缺陷的 SSH 客户端/服务器:

ssh -o MACs=hmac-sha2-256 <HOST>

或更改 MTU 大小(仅当您的网络出现异常时,例如由于 vpn 导致)

ip li set mtu 1400 dev wlan0

相关内容