SecureCRT登陆服务器的速度很慢, putty登陆很快, 问题解决!

SecureCRT登陆服务器的速度很慢, putty登陆很快, 问题解决!

1、现象: 使用crt连接服务器的速度很慢, 使用putty连接的速度却很快

2、解决思路:

打开securecrt的file--->trace options,点选后, 直接连接服务器,查看输出的trace信息,

可以看到如下信息:

 [PRINTER] : Printer initialization succeeded
[LOCAL] : SSH2Core version 8.5.0.1867 
[LOCAL] : Connecting to 192.168.18.131:22 ... 
[LOCAL] : Changing state from STATE_NOT_CONNECTED to STATE_EXPECT_KEX_INIT 
[LOCAL] : Using protocol SSH2 
[LOCAL] : RECV : Remote Identifier = 'SSH-2.0-OpenSSH_6.6.1' 
[LOCAL] : CAP  : Remote can re-key 
[LOCAL] : CAP  : Remote sends language in password change requests 
[LOCAL] : CAP  : Remote sends algorithm name in PK_OK packets 
[LOCAL] : CAP  : Remote sends algorithm name in public key packets 
[LOCAL] : CAP  : Remote sends algorithm name in signatures 
[LOCAL] : CAP  : Remote sends error text in open failure packets 
[LOCAL] : CAP  : Remote sends name in service accept packets 
[LOCAL] : CAP  : Remote includes port number in x11 open packets 
[LOCAL] : CAP  : Remote uses 160 bit keys for SHA1 MAC 
[LOCAL] : CAP  : Remote supports new diffie-hellman group exchange messages 
[LOCAL] : CAP  : Remote correctly handles unknown SFTP extensions 
[LOCAL] : CAP  : Remote correctly encodes OID for gssapi 
[LOCAL] : CAP  : Remote correctly uses connected addresses in forwarded-tcpip requests 
[LOCAL] : CAP  : Remote can do SFTP version 4 
[LOCAL] : CAP  : Remote uses SHA1 hash in RSA signatures for x.509v3 
[LOCAL] : CAP  : Remote x.509v3 uses ASN.1 encoding for DSA signatures 
[LOCAL] : CAP  : Remote correctly handles zlib@openssh.com 
[LOCAL] : SEND : KEXINIT 
[LOCAL] : RECV : Read kexinit 
[LOCAL] : Available Remote Kex Methods = curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 
[LOCAL] : Selected Kex Method = curve25519-sha256@libssh.org 
[LOCAL] : Available Remote Host Key Algos = ssh-rsa,ecdsa-sha2-nistp256,ssh-ed25519 
[LOCAL] : Selected Host Key Algo = ssh-rsa 
[LOCAL] : Available Remote Send Ciphers = aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se 
[LOCAL] : Selected Send Cipher = aes256-ctr 
[LOCAL] : Available Remote Recv Ciphers = aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se 
[LOCAL] : Selected Recv Cipher = aes256-ctr 
[LOCAL] : Available Remote Send Macs = hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 
[LOCAL] : Selected Send Mac = hmac-sha2-512 
[LOCAL] : Available Remote Recv Macs = hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 
[LOCAL] : Selected Recv Mac = hmac-sha2-512 
[LOCAL] : Available Remote Compressors = none,zlib@openssh.com 
[LOCAL] : Selected Compressor = none 
[LOCAL] : Available Remote Decompressors = none,zlib@openssh.com 
[LOCAL] : Selected Decompressor = none 
[LOCAL] : Changing state from STATE_EXPECT_KEX_INIT to STATE_KEY_EXCHANGE 
[LOCAL] : SEND : SSH_MSG_KEX_ECDH_INIT 
[LOCAL] : RECV : SSH_MSG_KEX_ECDH_REPLY 
[LOCAL] : Changing state from STATE_KEY_EXCHANGE to STATE_READY_FOR_NEW_KEYS 
[LOCAL] : RECV: Remote Hostkey (SHA-2 hash hex): a6:3b:be:e3:1a:41:d0:65:77:af:0b:5a:c8:75:8c:03:19:e7:ad:4d:d1:e7:a1:d7:9b:43:8e:ac:f4:70:e1:3e 
[LOCAL] : RECV: Remote Hostkey (SHA-2 hash base64): pju+4xpB0GV3rwtayHWMAxnnrU3R56HXm0OOrPRw4T4 
[LOCAL] : RECV: Remote Hostkey (SHA-1 hash): f1:e2:35:d1:22:a5:7f:87:fb:4e:05:cc:35:10:d2:63:93:6d:84:49 
[LOCAL] : RECV: Remote Hostkey (MD5 hash): fd:6a:16:b3:66:39:eb:97:26:c0:34:b5:de:56:1e:3e 
[LOCAL] : SEND : NEWKEYS 
[LOCAL] : Changing state from STATE_READY_FOR_NEW_KEYS to STATE_EXPECT_NEWKEYS 
[LOCAL] : RECV : NEWKEYS 
[LOCAL] : Changing state from STATE_EXPECT_NEWKEYS to STATE_CONNECTION 
[LOCAL] : SEND: SERVICE_REQUEST[ssh-userauth] 
[LOCAL] : RECV: SERVICE_ACCEPT[ssh-userauth] -- OK 
[LOCAL] : SENT : USERAUTH_REQUEST [none] 
[LOCAL] : Authenticating as user rhce  
[LOCAL] : RECV : USERAUTH_FAILURE, continuations [publickey,gssapi-keyex,gssapi-with-mic,password] 
[LOCAL] : SENT : USERAUTH_REQUEST [password] 
[LOCAL] : RECV : AUTH_SUCCESS 
[LOCAL] : SEND[0]: SSH_MSG_CHANNEL_OPEN('session')
SecureCRT - Version 8.5.3 (x64 build 1867)
[LOCAL] : SEND[0]: Pty Request (rows: 30, cols: 105)
[LOCAL] : RECV[0]: pty request succeeded
[LOCAL] : SEND[0]: shell request
[LOCAL] : RECV[0]: shell request succeeded

3、分析

可以看到有很多的 key exchange method是不支持的, 所以要尽快的连接,需要将不支持的选项禁用(此处没有过多的深入研究,如何支持这些报错的 key exchange method),如下图:

 

全局(all sessions)后重启crt,即可以实现快速连接。问题得到解决。 

有时间的朋友可以去研究下如何支持报错的key change method

评论 1
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值