Menu

Bugfix for: SSH2DOS not working with OpenSSH >6.7

UliHansen
2017-01-22
2018-07-07
  • UliHansen

    UliHansen - 2017-01-22

    EDIT Finally I got it to work. Please jump forward to my most recent reply...

    Took some time to solve this one... :-)
    Hope it helps! Good luck with DOS networking!
    Ulrich

    The solution:

    Add the following lines to /etc/ssh/sshd_config on the server:

    Ciphers aes128-cbc
    KexAlgorithms diffie-hellman-group-exchange-sha1

    It wasn't necessary, but it might not hurt to also add:

    MACs hmac-sha1

    The problem:

    SSH2DOS works fine with a Debian Wheezy machine with OpenSSH 6.0.

    But it does not connect to a Debian 8 machine with OpenSSH 6.7.
    It also does not connect to a Ubuntu 16.04 server with OpenSSH 7.2.

    SSH2DOS gives the following error code:

    C:> ssh2d386 username 192.168.1.136
    SSH2DOS v0.2.1. 386+ version
    Remote host closed connection
    DH key exchange failed
    Socket write error. File: transprt.c, line:698
    Remote reset connection

    On the server /var/log/auth.log says:
    Jan 23 00:17:25 debian8 sshd [1883]: fatal: Unable to negotiate a key exchange method [preauth]

    And SSH2D386 with the -d option writes the following information into DEBUG.PKT:


    RECEIVED packet:
    14 19 D1 34 D8 10 BA DE 87 62 E4 CF 70 8D 52 78
    AF 00 00 00 96 63 75 72 76 65 32 35 35 31 39 2D
    73 68 61 32 35 36 40 6C 69 62 73 73 68 2E 6F 72
    67 2C 65 63 64 68 2D 73 68 61 32 2D 6E 69 73 74
    70 32 35 36 2C 65 63 64 68 2D 73 68 61 32 2D 6E
    69 73 74 70 33 38 34 2C 65 63 64 68 2D 73 68 61
    32 2D 6E 69 73 74 70 35 32 31 2C 64 69 66 66 69
    65 2D 68 65 6C 6C 6D 61 6E 2D 67 72 6F 75 70 2D
    65 78 63 68 61 6E 67 65 2D 73 68 61 32 35 36 2C
    64 69 66 66 69 65 2D 68 65 6C 6C 6D 61 6E 2D 67
    72 6F 75 70 31 34 2D 73 68 61 31 00 00 00 2F 73
    73 68 2D 72 73 61 2C 73 73 68 2D 64 73 73 2C 65
    63 64 73 61 2D 73 68 61 32 2D 6E 69 73 74 70 32
    35 36 2C 73 73 68 2D 65 64 32 35 35 31 39 00 00
    00 E9 33 64 65 73 2D 63 62 63 2C 62 6C 6F 77 66
    69 73 68 2D 63 62 63 2C 63 61 73 74 31 32 38 2D
    63 62 63 2C 61 72 63 66 6F 75 72 2C 61 72 63 66
    6F 75 72 31 32 38 2C 61 72 63 66 6F 75 72 32 35
    36 2C 61 65 73 31 32 38 2D 63 62 63 2C 61 65 73
    31 39 32 2D 63 62 63 2C 61 65 73 32 35 36 2D 63
    62 63 2C 72 69 6A 6E 64 61 65 6C 2D 63 62 63 40
    6C 79 73 61 74 6F 72 2E 6C 69 75 2E 73 65 2C 61
    65 73 31 32 38 2D 63 74 72 2C 61 65 73 31 39 32
    2D 63 74 72 2C 61 65 73 32 35 36 2D 63 74 72 2C
    61 65 73 31 32 38 2D 67 63 6D 40 6F 70 65 6E 73
    73 68 2E 63 6F 6D 2C 61 65 73 32 35 36 2D 67 63
    6D 40 6F 70 65 6E 73 73 68 2E 63 6F 6D 2C 63 68
    61 63 68 61 32 30 2D 70 6F 6C 79 31 33 30 35 40
    6F 70 65 6E 73 73 68 2E 63 6F 6D 00 00 00 E9 33
    64 65 73 2D 63 62 63 2C 62 6C 6F 77 66 69 73 68
    2D 63 62 63 2C 63 61 73 74 31 32 38 2D 63 62 63
    2C 61 72 63 66 6F 75 72 2C 61 72 63 66 6F 75 72
    31 32 38 2C 61 72 63 66 6F 75 72 32 35 36 2C 61
    65 73 31 32 38 2D 63 62 63 2C 61 65 73 31 39 32
    2D 63 62 63 2C 61 65 73 32 35 36 2D 63 62 63 2C
    72 69 6A 6E 64 61 65 6C 2D 63 62 63 40 6C 79 73
    61 74 6F 72 2E 6C 69 75 2E 73 65 2C 61 65 73 31
    32 38 2D 63 74 72 2C 61 65 73 31 39 32 2D 63 74
    72 2C 61 65 73 32 35 36 2D 63 74 72 2C 61 65 73
    31 32 38 2D 67 63 6D 40 6F 70 65 6E 73 73 68 2E
    63 6F 6D 2C 61 65 73 32 35 36 2D 67 63 6D 40 6F
    70 65 6E 73 73 68 2E 63 6F 6D 2C 63 68 61 63 68
    61 32 30 2D 70 6F 6C 79 31 33 30 35 40 6F 70 65
    6E 73 73 68 2E 63 6F 6D 00 00 01 92 68 6D 61 63
    2D 73 68 61 31 2C 68 6D 61 63 2D 73 68 61 31 2D
    39 36 2C 68 6D 61 63 2D 73 68 61 32 2D 32 35 36
    2C 68 6D 61 63 2D 73 68 61 32 2D 35 31 32 2C 68
    6D 61 63 2D 6D 64 35 2C 68 6D 61 63 2D 6D 64 35
    2D 39 36 2C 68 6D 61 63 2D 72 69 70 65 6D 64 31
    36 30 2C 68 6D 61 63 2D 72 69 70 65 6D 64 31 36
    30 40 6F 70 65 6E 73 73 68 2E 63 6F 6D 2C 75 6D
    61 63 2D 36 34 40 6F 70 65 6E 73 73 68 2E 63 6F
    6D 2C 75 6D 61 63 2D 31 32 38 40 6F 70 65 6E 73
    73 68 2E 63 6F 6D 2C 68 6D 61 63 2D 73 68 61 31
    2D 65 74 6D 40 6F 70 65 6E 73 73 68 2E 63 6F 6D
    2C 68 6D 61 63 2D 73 68 61 31 2D 39 36 2D 65 74
    6D 40 6F 70 65 6E 73 73 68 2E 63 6F 6D 2C 68 6D
    61 63 2D 73 68 61 32 2D 32 35 36 2D 65 74 6D 40
    6F 70 65 6E 73 73 68 2E 63 6F 6D 2C 68 6D 61 63
    2D 73 68 61 32 2D 35 31 32 2D 65 74 6D 40 6F 70
    65 6E 73 73 68 2E 63 6F 6D 2C 68 6D 61 63 2D 6D
    64 35 2D 65 74 6D 40 6F 70 65 6E 73 73 68 2E 63
    6F 6D 2C 68 6D 61 63 2D 6D 64 35 2D 39 36 2D 65
    74 6D 40 6F 70 65 6E 73 73 68 2E 63 6F 6D 2C 68
    6D 61 63 2D 72 69 70 65 6D 64 31 36 30 2D 65 74
    6D 40 6F 70 65 6E 73 73 68 2E 63 6F 6D 2C 75 6D
    61 63 2D 36 34 2D 65 74 6D 40 6F 70 65 6E 73 73
    68 2E 63 6F 6D 2C 75 6D 61 63 2D 31 32 38 2D 65
    74 6D 40 6F 70 65 6E 73 73 68 2E 63 6F 6D 00 00
    01 92 68 6D 61 63 2D 73 68 61 31 2C 68 6D 61 63
    2D 73 68 61 31 2D 39 36 2C 68 6D 61 63 2D 73 68
    61 32 2D 32 35 36 2C 68 6D 61 63 2D 73 68 61 32
    2D 35 31 32 2C 68 6D 61 63 2D 6D 64 35 2C 68 6D
    61 63 2D 6D 64 35 2D 39 36 2C 68 6D 61 63 2D 72
    69 70 65 6D 64 31 36 30 2C 68 6D 61 63 2D 72 69
    70 65 6D 64 31 36 30 40 6F 70 65 6E 73 73 68 2E
    63 6F 6D 2C 75 6D 61 63 2D 36 34 40 6F 70 65 6E
    73 73 68 2E 63 6F 6D 2C 75 6D 61 63 2D 31 32 38
    40 6F 70 65 6E 73 73 68 2E 63 6F 6D 2C 68 6D 61
    63 2D 73 68 61 31 2D 65 74 6D 40 6F 70 65 6E 73
    73 68 2E 63 6F 6D 2C 68 6D 61 63 2D 73 68 61 31
    2D 39 36 2D 65 74 6D 40 6F 70 65 6E 73 73 68 2E
    63 6F 6D 2C 68 6D 61 63 2D 73 68 61 32 2D 32 35
    36 2D 65 74 6D 40 6F 70 65 6E 73 73 68 2E 63 6F
    6D 2C 68 6D 61 63 2D 73 68 61 32 2D 35 31 32 2D
    65 74 6D 40 6F 70 65 6E 73 73 68 2E 63 6F 6D 2C
    68 6D 61 63 2D 6D 64 35 2D 65 74 6D 40 6F 70 65
    6E 73 73 68 2E 63 6F 6D 2C 68 6D 61 63 2D 6D 64
    35 2D 39 36 2D 65 74 6D 40 6F 70 65 6E 73 73 68
    2E 63 6F 6D 2C 68 6D 61 63 2D 72 69 70 65 6D 64
    31 36 30 2D 65 74 6D 40 6F 70 65 6E 73 73 68 2E
    63 6F 6D 2C 75 6D 61 63 2D 36 34 2D 65 74 6D 40
    6F 70 65 6E 73 73 68 2E 63 6F 6D 2C 75 6D 61 63
    2D 31 32 38 2D 65 74 6D 40 6F 70 65 6E 73 73 68
    2E 63 6F 6D 00 00 00 15 6E 6F 6E 65 2C 7A 6C 69
    62 40 6F 70 65 6E 73 73 68 2E 63 6F 6D 00 00 00
    15 6E 6F 6E 65 2C 7A 6C 69 62 40 6F 70 65 6E 73
    73 68 2E 63 6F 6D 00 00 00 00 00 00 00 00 00 00
    00 00 00
    ...4.....b..p.Rx
    .....curve25519-
    sha256@libssh.or
    g,ecdh-sha2-nist
    p256,ecdh-sha2-n
    istp384,ecdh-sha
    2-nistp521,diffi
    e-hellman-group-
    exchange-sha256,
    diffie-hellman-g
    roup14-sha1.../s
    sh-rsa,ssh-dss,e
    cdsa-sha2-nistp2
    56,ssh-ed25519..
    ..3des-cbc,blowf
    ish-cbc,cast128-
    cbc,arcfour,arcf
    our128,arcfour25
    6,aes128-cbc,aes
    192-cbc,aes256-c
    bc,rijndael-cbc@
    lysator.liu.se,a
    es128-ctr,aes192
    -ctr,aes256-ctr,
    aes128-gcm@opens
    sh.com,aes256-gc
    m@openssh.com,ch
    acha20-poly1305@
    openssh.com....3
    des-cbc,blowfish
    -cbc,cast128-cbc
    ,arcfour,arcfour
    128,arcfour256,a
    es128-cbc,aes192
    -cbc,aes256-cbc,
    rijndael-cbc@lys
    ator.liu.se,aes1
    28-ctr,aes192-ct
    r,aes256-ctr,aes
    128-gcm@openssh.
    com,aes256-gcm@o
    penssh.com,chach
    a20-poly1305@ope
    nssh.com....hmac
    -sha1,hmac-sha1-
    96,hmac-sha2-256
    ,hmac-sha2-512,h
    mac-md5,hmac-md5
    -96,hmac-ripemd1
    60,hmac-ripemd16
    0@openssh.com,um
    ac-64@openssh.co
    m,umac-128@opens
    sh.com,hmac-sha1
    -etm@openssh.com
    ,hmac-sha1-96-et
    m@openssh.com,hm
    ac-sha2-256-etm@
    openssh.com,hmac
    -sha2-512-etm@op
    enssh.com,hmac-m
    d5-etm@openssh.c
    om,hmac-md5-96-e
    tm@openssh.com,h
    mac-ripemd160-et
    m@openssh.com,um
    ac-64-etm@openss
    h.com,umac-128-e
    tm@openssh.com..
    ..hmac-sha1,hmac
    -sha1-96,hmac-sh
    a2-256,hmac-sha2
    -512,hmac-md5,hm
    ac-md5-96,hmac-r
    ipemd160,hmac-ri
    pemd160@openssh.
    com,umac-64@open
    ssh.com,umac-128
    @openssh.com,hma
    c-sha1-etm@opens
    sh.com,hmac-sha1
    -96-etm@openssh.
    com,hmac-sha2-25
    6-etm@openssh.co
    m,hmac-sha2-512-
    etm@openssh.com,
    hmac-md5-etm@ope
    nssh.com,hmac-md
    5-96-etm@openssh
    .com,hmac-ripemd
    160-etm@openssh.
    com,umac-64-etm@
    openssh.com,umac
    -128-etm@openssh
    .com....none,zli
    b@openssh.com...
    .none,zlib@opens
    sh.com..........
    ...

    SENT packet:
    14 97 51 49 CA 09 AA 92 BB C0 25 D3 4C C9 30 D1
    E1 00 00 00 22 64 69 66 66 69 65 2D 68 65 6C 6C
    6D 61 6E 2D 67 72 6F 75 70 2D 65 78 63 68 61 6E
    67 65 2D 73 68 61 31 00 00 00 07 73 73 68 2D 64
    73 73 00 00 00 0A 61 65 73 31 32 38 2D 63 62 63
    00 00 00 0A 61 65 73 31 32 38 2D 63 62 63 00 00
    00 09 68 6D 61 63 2D 73 68 61 31 00 00 00 09 68
    6D 61 63 2D 73 68 61 31 00 00 00 09 6E 6F 6E 65
    2C 7A 6C 69 62 00 00 00 09 6E 6F 6E 65 2C 7A 6C
    69 62 00 00 00 00 00 00 00 00 00 00 00 00 00
    ..QI......%.L.0.
    ...."diffie-hell
    man-group-exchan
    ge-sha1....ssh-d
    ss....aes128-cbc
    ....aes128-cbc..
    ..hmac-sha1....h
    mac-sha1....none
    ,zlib....none,zl
    ib.............

    SENT packet:
    1E 00 00 04 00
    .....

    SENT packet:
    62 00 00 00 00 00 00 00 07 70 74 79 2D 72 65 71
    01 00 00 00 05 78 74 65 72 6D 00 00 00 50 00 00
    00 18 00 00 00 00 00 00 00 00 00 00 00 00
    b........pty-req
    .....xterm...P..
    ..............

     

    Last edit: UliHansen 2017-01-27
  • UliHansen

    UliHansen - 2017-01-23

    I am sorry, but the solution I presented in my earlier post seems to work only for older OpenSSH servers.

    For Ubuntu 16.04 LTS (with OpenSSH 7.2.) I also had to add:

    HostKeyAlgorithms ssh-dss

    to /etc/ssh/sshd_config because ssh-dss seems to have been deactivated by default since OpenSSH 6.9.

    But in the end SSH2DOS was still not able to connect to OpenSSH 7.2.

    Perhaps someone has an idea?

    At the moment SSH2DOS can only be used to connect to older servers, running f.i. Debian Wheezy (OpenSSH 6.0) or Jessie (OpenSSH 6.7). So soon there will be no functioning SSH client anymore for DOS. :-(

    Here are the messages:

    SSH2DOS error message is:

    C:> ssh2d386 username 192.168.1.131
    SSH2DOS v0.2.1. 386+ version
    Expected KEX_DH_GEX_GROUP
    DH key exchange failed
    Remote host closed connection
    Socket write error. File: transprt.c, line:698
    Connection closed by peer

    On the server, Ubuntu 16.04 LTS (with OpenSSH 7.2.), /var/log/auth.log says:

    Jan 23 09:55:09 ubuntu-VirtualBox sshd[4661]: error: kex protocol error: type 30 seq 1 [preauth]
    Jan 23 09:55:09 ubuntu-VirtualBox sshd[4661]: error: Received disconnect from 192.168.1.110 port 564:3: Expected KEX_DH_GEX_GROUP [preauth]
    Jan 23 09:55:09 ubuntu-VirtualBox sshd[4661]: Disconnected from 192.168.1.110 port 564 [preauth]

    C:> ssh2d386 -d username 192.168.1.131

    wrote the following output in C:\SSH2DOS\DEBUG.PKT:


    RECEIVED packet:
    14 BE 6D 01 48 D3 E5 EB 2A C1 81 DE E7 31 AB DB
    B2 00 00 00 22 64 69 66 66 69 65 2D 68 65 6C 6C
    6D 61 6E 2D 67 72 6F 75 70 2D 65 78 63 68 61 6E
    67 65 2D 73 68 61 31 00 00 00 07 73 73 68 2D 64
    73 73 00 00 00 0A 61 65 73 31 32 38 2D 63 62 63
    00 00 00 0A 61 65 73 31 32 38 2D 63 62 63 00 00
    00 D5 75 6D 61 63 2D 36 34 2D 65 74 6D 40 6F 70
    65 6E 73 73 68 2E 63 6F 6D 2C 75 6D 61 63 2D 31
    32 38 2D 65 74 6D 40 6F 70 65 6E 73 73 68 2E 63
    6F 6D 2C 68 6D 61 63 2D 73 68 61 32 2D 32 35 36
    2D 65 74 6D 40 6F 70 65 6E 73 73 68 2E 63 6F 6D
    2C 68 6D 61 63 2D 73 68 61 32 2D 35 31 32 2D 65
    74 6D 40 6F 70 65 6E 73 73 68 2E 63 6F 6D 2C 68
    6D 61 63 2D 73 68 61 31 2D 65 74 6D 40 6F 70 65
    6E 73 73 68 2E 63 6F 6D 2C 75 6D 61 63 2D 36 34
    40 6F 70 65 6E 73 73 68 2E 63 6F 6D 2C 75 6D 61
    63 2D 31 32 38 40 6F 70 65 6E 73 73 68 2E 63 6F
    6D 2C 68 6D 61 63 2D 73 68 61 32 2D 32 35 36 2C
    68 6D 61 63 2D 73 68 61 32 2D 35 31 32 2C 68 6D
    61 63 2D 73 68 61 31 00 00 00 D5 75 6D 61 63 2D
    36 34 2D 65 74 6D 40 6F 70 65 6E 73 73 68 2E 63
    6F 6D 2C 75 6D 61 63 2D 31 32 38 2D 65 74 6D 40
    6F 70 65 6E 73 73 68 2E 63 6F 6D 2C 68 6D 61 63
    2D 73 68 61 32 2D 32 35 36 2D 65 74 6D 40 6F 70
    65 6E 73 73 68 2E 63 6F 6D 2C 68 6D 61 63 2D 73
    68 61 32 2D 35 31 32 2D 65 74 6D 40 6F 70 65 6E
    73 73 68 2E 63 6F 6D 2C 68 6D 61 63 2D 73 68 61
    31 2D 65 74 6D 40 6F 70 65 6E 73 73 68 2E 63 6F
    6D 2C 75 6D 61 63 2D 36 34 40 6F 70 65 6E 73 73
    68 2E 63 6F 6D 2C 75 6D 61 63 2D 31 32 38 40 6F
    70 65 6E 73 73 68 2E 63 6F 6D 2C 68 6D 61 63 2D
    73 68 61 32 2D 32 35 36 2C 68 6D 61 63 2D 73 68
    61 32 2D 35 31 32 2C 68 6D 61 63 2D 73 68 61 31
    00 00 00 15 6E 6F 6E 65 2C 7A 6C 69 62 40 6F 70
    65 6E 73 73 68 2E 63 6F 6D 00 00 00 15 6E 6F 6E
    65 2C 7A 6C 69 62 40 6F 70 65 6E 73 73 68 2E 63
    6F 6D 00 00 00 00 00 00 00 00 00 00 00 00 00
    ..m.H...*....1..
    ...."diffie-hell
    man-group-exchan
    ge-sha1....ssh-d
    ss....aes128-cbc
    ....aes128-cbc..
    ..umac-64-etm@op
    enssh.com,umac-1
    28-etm@openssh.c
    om,hmac-sha2-256
    -etm@openssh.com
    ,hmac-sha2-512-e
    tm@openssh.com,h
    mac-sha1-etm@ope
    nssh.com,umac-64
    @openssh.com,uma
    c-128@openssh.co
    m,hmac-sha2-256,
    hmac-sha2-512,hm
    ac-sha1....umac-
    64-etm@openssh.c
    om,umac-128-etm@
    openssh.com,hmac
    -sha2-256-etm@op
    enssh.com,hmac-s
    ha2-512-etm@open
    ssh.com,hmac-sha
    1-etm@openssh.co
    m,umac-64@openss
    h.com,umac-128@o
    penssh.com,hmac-
    sha2-256,hmac-sh
    a2-512,hmac-sha1
    ....none,zlib@op
    enssh.com....non
    e,zlib@openssh.c
    om.............

    SENT packet:
    14 25 81 88 A7 CD 90 15 0E 5E 3B 7C B4 0B 1E 9D
    CA 00 00 00 22 64 69 66 66 69 65 2D 68 65 6C 6C
    6D 61 6E 2D 67 72 6F 75 70 2D 65 78 63 68 61 6E
    67 65 2D 73 68 61 31 00 00 00 07 73 73 68 2D 64
    73 73 00 00 00 0A 61 65 73 31 32 38 2D 63 62 63
    00 00 00 0A 61 65 73 31 32 38 2D 63 62 63 00 00
    00 09 68 6D 61 63 2D 73 68 61 31 00 00 00 09 68
    6D 61 63 2D 73 68 61 31 00 00 00 09 6E 6F 6E 65
    2C 7A 6C 69 62 00 00 00 09 6E 6F 6E 65 2C 7A 6C
    69 62 00 00 00 00 00 00 00 00 00 00 00 00 00
    .%.......^;|....
    ...."diffie-hell
    man-group-exchan
    ge-sha1....ssh-d
    ss....aes128-cbc
    ....aes128-cbc..
    ..hmac-sha1....h
    mac-sha1....none
    ,zlib....none,zl
    ib.............

    SENT packet:
    1E 00 00 04 00
    .....

    RECEIVED packet:
    03 00 00 00 01
    .....

    SENT packet:
    03 00 00 00 02
    .....

    SENT packet:
    01 00 00 00 03 00 00 00 19 45 78 70 65 63 74 65
    64 20 4B 45 58 5F 44 48 5F 47 45 58 5F 47 52 4F
    55 50 00 00 00 00
    .........Expecte
    d KEX_DH_GEX_GRO
    UP....

    SENT packet:
    62 00 00 00 00 00 00 00 07 70 74 79 2D 72 65 71
    01 00 00 00 05 78 74 65 72 6D 00 00 00 50 00 00
    00 18 00 00 00 00 00 00 00 00 00 00 00 00
    b........pty-req
    .....xterm...P..
    ..............

    SENT packet:
    62 00 00 00 00 00 00 00 05 73 68 65 6C 6C 01
    b........shell.

     
  • UliHansen

    UliHansen - 2017-01-27

    This solved my problem:
    https://www.mail-archive.com/freedos-user@lists.sourceforge.net/msg17946.html

    I am now able to connect to an Ubuntu 16.04 LTS server running OpenSSH 7.2 with a SS2DOS v.0.2.1 client from FreeDOS 1.2.

    I quote the solution here, so maybe it helps others...

    Dan Schmidt wrote to the FreeDOS user mailing list:

    Firstly, add this to your server's /etc/ssh/sshd_config:

    KexAlgorithms diffie-hellman-group1-sha1,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1
    Ciphers 3des-cbc,blowfish-cbc,aes128-cbc,aes128-ctr,aes256-ctr
    HostKeyAlgorithms +ssh-dss

    Then, make use of the -g option - it goes BEFORE your username in ssh2dos. You should now be able to connect.

    I do not know why simply adding +diffie-hellman-group1-sha1 doesn't work, it seems it should. Also, I was in a rush - I may be excluding some newer options - report back if you find/add them with success.

    You may need to regenerate your keys with "ssh-keygen -A" after modifying the server.

     

    Last edit: UliHansen 2017-01-27
    • karen Lewellen

      karen Lewellen - 2018-07-07

      Hi folks,
      I am not hosting my own server, but using the ssh2d386 client to reach our
      office shell with dreamhost. Unfortunately on 29 June they stopped
      supporting a number of keys. I am unsure why the -g option is not
      working. I need to create a log file for them, but cannot figure out how
      the -l option works for this?
      Thanks,

       

Log in to post a comment.