Bug 7580 - Confusing error messages when SSH cannot open a session
Summary: Confusing error messages when SSH cannot open a session
Status: NEW
Alias: None
Product: ThinLinc
Classification: Unclassified
Component: Client (show other bugs)
Version: trunk
Hardware: PC Unknown
: P2 Normal
Target Milestone: LowPrio
Assignee: Bugzilla mail exporter
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2020-11-03 14:00 CET by Pierre Ossman
Modified: 2021-03-09 13:11 CET (History)
0 users

See Also:
Acceptance Criteria:


Attachments

Description Pierre Ossman cendio 2020-11-03 14:00:30 CET
If the server is in a state where authentication succeeds, but SSH cannot open a session, then the ThinLinc client will produce some unhelpful error messages.

If it happens during the master connection then the client will state "The SSH connection succeeded, but the ThinLinc server connection failed. Perhaps this server doesn't run a ThinLinc server?".

If it happens during the agent connection then the client will state "Your session lasted less than 10 seconds. ...".

It doesn't matter if the client uses "password" or "keyboard-interactive" to authenticate.


The scenario that caused this was using pam_limits.so to limit the number of sessions allowed on a system.
Comment 1 Pierre Ossman cendio 2020-11-03 14:00:57 CET
Log from connection to master:

> 2020-11-03T13:51:33: SSH command: /opt/thinlinc/lib/tlclient/ssh -N -o GlobalKnownHostsFile=/dev/null -o UserKnownHostsFile=/dev/null -o PubkeyAuthentication=no -o CheckHostIP=no -o NumberOfPasswordPrompts=1 -v cendio@lab-170 -p 22 thinlinc-login master
> 2020-11-03T13:51:33: SSH pid is 3963207
> 2020-11-03T13:51:33: ssh[E]: OpenSSH_8.3p1, OpenSSL 1.1.1g  21 Apr 2020
> 2020-11-03T13:51:33: ssh[E]: debug1: Reading configuration data /home/ossman/.thinlinc/config
> 2020-11-03T13:51:33: ssh[E]: debug1: Authenticator provider $SSH_SK_PROVIDER did not resolve; disabling
> 2020-11-03T13:51:33: ssh[E]: debug1: Connecting to lab-170 [10.48.2.170] port 22.
> 2020-11-03T13:51:33: ssh[E]: debug1: Connection established.
> 2020-11-03T13:51:33: ssh[E]: debug1: identity file /home/ossman/.thinlinc/id_rsa type -1
> 2020-11-03T13:51:33: ssh[E]: debug1: identity file /home/ossman/.thinlinc/id_rsa-cert type -1
> 2020-11-03T13:51:33: ssh[E]: debug1: identity file /home/ossman/.thinlinc/id_dsa type -1
> 2020-11-03T13:51:33: ssh[E]: debug1: identity file /home/ossman/.thinlinc/id_dsa-cert type -1
> 2020-11-03T13:51:33: ssh[E]: debug1: identity file /home/ossman/.thinlinc/id_ecdsa type -1
> 2020-11-03T13:51:33: ssh[E]: debug1: identity file /home/ossman/.thinlinc/id_ecdsa-cert type -1
> 2020-11-03T13:51:33: ssh[E]: debug1: identity file /home/ossman/.thinlinc/id_ecdsa_sk type -1
> 2020-11-03T13:51:33: ssh[E]: debug1: identity file /home/ossman/.thinlinc/id_ecdsa_sk-cert type -1
> 2020-11-03T13:51:33: ssh[E]: debug1: identity file /home/ossman/.thinlinc/id_ed25519 type -1
> 2020-11-03T13:51:33: ssh[E]: debug1: identity file /home/ossman/.thinlinc/id_ed25519-cert type -1
> 2020-11-03T13:51:33: ssh[E]: debug1: identity file /home/ossman/.thinlinc/id_ed25519_sk type -1
> 2020-11-03T13:51:33: ssh[E]: debug1: identity file /home/ossman/.thinlinc/id_ed25519_sk-cert type -1
> 2020-11-03T13:51:33: ssh[E]: debug1: identity file /home/ossman/.thinlinc/id_xmss type -1
> 2020-11-03T13:51:33: ssh[E]: debug1: identity file /home/ossman/.thinlinc/id_xmss-cert type -1
> 2020-11-03T13:51:33: ssh[E]: debug1: Local version string SSH-2.0-OpenSSH_8.3
> 2020-11-03T13:51:33: ssh[E]: debug1: Remote protocol version 2.0, remote software version OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
> 2020-11-03T13:51:33: ssh[E]: debug1: match: OpenSSH_7.6p1 Ubuntu-4ubuntu0.3 pat OpenSSH_7.0*,OpenSSH_7.1*,OpenSSH_7.2*,OpenSSH_7.3*,OpenSSH_7.4*,OpenSSH_7.5*,OpenSSH_7.6*,OpenSSH_7.7* compat 0x04000002
> 2020-11-03T13:51:33: ssh[E]: debug1: Authenticating to lab-170:22 as 'cendio'
> 2020-11-03T13:51:33: ssh[E]: debug1: SSH2_MSG_KEXINIT sent
> 2020-11-03T13:51:33: ssh[E]: debug1: SSH2_MSG_KEXINIT received
> 2020-11-03T13:51:33: ssh[E]: debug1: kex: algorithm: curve25519-sha256
> 2020-11-03T13:51:33: ssh[E]: debug1: kex: host key algorithm: ecdsa-sha2-nistp256
> 2020-11-03T13:51:33: ssh[E]: debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none
> 2020-11-03T13:51:33: ssh[E]: debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none
> 2020-11-03T13:51:33: ssh[E]: debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
> 2020-11-03T13:51:33: ssh[E]: debug1: Server host key: ecdsa-sha2-nistp256 SHA256:ogxtBRm8jtrE0MKCnZX9wSIDtWYoHeP2IJCmSlKLMF0
> 2020-11-03T13:51:33: ssh[E]: CONFIRM HOST KEY: lab-170 10.48.2.170 22 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBLHKT5Y3NmpCEvBEBZ2dbxk51ETSr1eKcGBqilVcQYrs78Sie80GVw8UCPgLUKKR2s8NfNkkSPvYYqQzp+IRsRE=
> 2020-11-03T13:51:33: Fingerprint from server: |4a:72:1d:a1:8d:83:93:d4:ad:d8:7c:bb:ea:87:97:42|
> 2020-11-03T13:51:33: Known host key fingerprints:
> 2020-11-03T13:51:33:     |4a:72:1d:a1:8d:83:93:d4:ad:d8:7c:bb:ea:87:97:42|
> 2020-11-03T13:51:33: Host key previously known.
> 2020-11-03T13:51:33: ssh[E]: debug1: rekey out after 134217728 blocks
> 2020-11-03T13:51:33: ssh[E]: debug1: SSH2_MSG_NEWKEYS sent
> 2020-11-03T13:51:33: ssh[E]: debug1: expecting SSH2_MSG_NEWKEYS
> 2020-11-03T13:51:33: ssh[E]: debug1: SSH2_MSG_NEWKEYS received
> 2020-11-03T13:51:33: ssh[E]: debug1: rekey in after 134217728 blocks
> 2020-11-03T13:51:33: ssh[E]: debug1: Will attempt key: /home/ossman/.thinlinc/id_rsa 
> 2020-11-03T13:51:33: ssh[E]: debug1: Will attempt key: /home/ossman/.thinlinc/id_dsa 
> 2020-11-03T13:51:33: ssh[E]: debug1: Will attempt key: /home/ossman/.thinlinc/id_ecdsa 
> 2020-11-03T13:51:33: ssh[E]: debug1: Will attempt key: /home/ossman/.thinlinc/id_ecdsa_sk 
> 2020-11-03T13:51:33: ssh[E]: debug1: Will attempt key: /home/ossman/.thinlinc/id_ed25519 
> 2020-11-03T13:51:33: ssh[E]: debug1: Will attempt key: /home/ossman/.thinlinc/id_ed25519_sk 
> 2020-11-03T13:51:33: ssh[E]: debug1: Will attempt key: /home/ossman/.thinlinc/id_xmss 
> 2020-11-03T13:51:33: ssh[E]: debug1: SSH2_MSG_EXT_INFO received
> 2020-11-03T13:51:33: ssh[E]: debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521>
> 2020-11-03T13:51:33: ssh[E]: debug1: SSH2_MSG_SERVICE_ACCEPT received
> 2020-11-03T13:51:33: ssh[E]: NEXT AUTHMETHOD: none
> 2020-11-03T13:51:33: ssh[E]: AUTH FAILURE
> 2020-11-03T13:51:33: ssh[E]: debug1: Authentications that can continue: publickey,password
> 2020-11-03T13:51:33: ssh[E]: NEXT AUTHMETHOD: password
> 2020-11-03T13:51:33: ssh[E]: PASSWORD: cendio lab-170
> 2020-11-03T13:51:33: ssh[E]: AUTH SUCCESS
> 2020-11-03T13:51:33: ssh[E]: debug1: Authentication succeeded (password).
> 2020-11-03T13:51:33: ssh[E]: Authenticated to lab-170 ([10.48.2.170]:22).
> 2020-11-03T13:51:33: ssh[E]: debug1: channel 0: new [client-session]
> 2020-11-03T13:51:33: ssh[E]: CONNECTED
> 2020-11-03T13:51:33: ssh[E]: debug1: Requesting no-more-sessions@openssh.com
> 2020-11-03T13:51:33: ssh[E]: debug1: Entering interactive session.
> 2020-11-03T13:51:33: ssh[E]: debug1: pledge: network
> 2020-11-03T13:51:34: ssh[E]: debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0
> 2020-11-03T13:51:34: ssh[E]: debug1: Sending command: thinlinc-login master
> 2020-11-03T13:51:34: ssh[E]: debug1: client_input_channel_req: channel 0 rtype exit-status reply 0
> 2020-11-03T13:51:34: ssh[E]: debug1: client_input_channel_req: channel 0 rtype eow@openssh.com reply 0
> 2020-11-03T13:51:34: ssh[E]: 
> 2020-11-03T13:51:34: ssh[E]: COMMAND_EXITSTATUS: 254
> 2020-11-03T13:51:34: ssh[E]: debug1: fd 0 clearing O_NONBLOCK
> 2020-11-03T13:51:34: ssh[E]: debug1: fd 2 clearing O_NONBLOCK
> 2020-11-03T13:51:34: ssh[E]: Transferred: sent 1984, received 3308 bytes, in 1.0 seconds
> 2020-11-03T13:51:34: ssh[E]: Bytes per second: sent 1984.3, received 3308.6
> 2020-11-03T13:51:34: ssh[E]: debug1: Exit status 0
> 2020-11-03T13:51:34: ssh: Too many logins for 'cendio'.
> 2020-11-03T13:51:34: ServiceProcess: Recieved EOF on fd 10 for service ssh
> 2020-11-03T13:51:34: ServiceProcess: Recieved EOF on fd 8 for service ssh
> 2020-11-03T13:53:15: Process 3963207 exited with code 0
> 2020-11-03T13:53:17: Log file ended
Comment 2 Pierre Ossman cendio 2020-11-03 14:01:30 CET
Log from connection to agent:

> 2020-11-03T13:55:00: SSH command: /opt/thinlinc/lib/tlclient/ssh -N -o GlobalKnownHostsFile=/dev/null -o UserKnownHostsFile=/dev/null -o PubkeyAuthentication=no -o CheckHostIP=no -o NumberOfPasswordPrompts=1 -o HostKeyAlgorithms=ssh-rsa,ecdsa-sha2-nistp256 -v cendio@10.48.2.170 -p 22 -L 44759:127.0.0.1:5911 -R 5015:127.0.0.1:37017 -R 5016:127.0.0.1:41531 -R 5014:127.0.0.1:43299 -R 5013:127.0.0.1:43747 thinlinc-login dummy
> 2020-11-03T13:55:00: SSH pid is 3963717
> 2020-11-03T13:55:00: ssh[E]: debug1: channel 0: free: client-session, nchannels 1
> 2020-11-03T13:55:00: ssh[E]: debug1: fd 0 clearing O_NONBLOCK
> 2020-11-03T13:55:00: ssh[E]: debug1: fd 2 clearing O_NONBLOCK
> 2020-11-03T13:55:00: ssh[E]: Transferred: sent 4704, received 9172 bytes, in 3.4 seconds
> 2020-11-03T13:55:00: ssh[E]: Bytes per second: sent 1388.8, received 2708.0
> 2020-11-03T13:55:00: ssh[E]: debug1: Exit status 0
> 2020-11-03T13:55:00: ServiceProcess: Recieved EOF on fd 10 for service ssh
> 2020-11-03T13:55:00: ssh[E]: OpenSSH_8.3p1, OpenSSL 1.1.1g  21 Apr 2020
> 2020-11-03T13:55:00: ssh[E]: debug1: Reading configuration data /home/ossman/.thinlinc/config
> 2020-11-03T13:55:00: ssh[E]: debug1: Authenticator provider $SSH_SK_PROVIDER did not resolve; disabling
> 2020-11-03T13:55:00: ssh[E]: debug1: Connecting to 10.48.2.170 [10.48.2.170] port 22.
> 2020-11-03T13:55:00: ssh[E]: debug1: Connection established.
> 2020-11-03T13:55:00: ssh[E]: debug1: identity file /home/ossman/.thinlinc/id_rsa type -1
> 2020-11-03T13:55:00: ssh[E]: debug1: identity file /home/ossman/.thinlinc/id_rsa-cert type -1
> 2020-11-03T13:55:00: ssh[E]: debug1: identity file /home/ossman/.thinlinc/id_dsa type -1
> 2020-11-03T13:55:00: ssh[E]: debug1: identity file /home/ossman/.thinlinc/id_dsa-cert type -1
> 2020-11-03T13:55:00: ssh[E]: debug1: identity file /home/ossman/.thinlinc/id_ecdsa type -1
> 2020-11-03T13:55:00: ssh[E]: debug1: identity file /home/ossman/.thinlinc/id_ecdsa-cert type -1
> 2020-11-03T13:55:00: ssh[E]: debug1: identity file /home/ossman/.thinlinc/id_ecdsa_sk type -1
> 2020-11-03T13:55:00: ssh[E]: debug1: identity file /home/ossman/.thinlinc/id_ecdsa_sk-cert type -1
> 2020-11-03T13:55:00: ssh[E]: debug1: identity file /home/ossman/.thinlinc/id_ed25519 type -1
> 2020-11-03T13:55:00: ssh[E]: debug1: identity file /home/ossman/.thinlinc/id_ed25519-cert type -1
> 2020-11-03T13:55:00: ssh[E]: debug1: identity file /home/ossman/.thinlinc/id_ed25519_sk type -1
> 2020-11-03T13:55:00: ssh[E]: debug1: identity file /home/ossman/.thinlinc/id_ed25519_sk-cert type -1
> 2020-11-03T13:55:00: ssh[E]: debug1: identity file /home/ossman/.thinlinc/id_xmss type -1
> 2020-11-03T13:55:00: ssh[E]: debug1: identity file /home/ossman/.thinlinc/id_xmss-cert type -1
> 2020-11-03T13:55:00: ssh[E]: debug1: Local version string SSH-2.0-OpenSSH_8.3
> 2020-11-03T13:55:00: ssh[E]: debug1: Remote protocol version 2.0, remote software version OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
> 2020-11-03T13:55:00: ssh[E]: debug1: match: OpenSSH_7.6p1 Ubuntu-4ubuntu0.3 pat OpenSSH_7.0*,OpenSSH_7.1*,OpenSSH_7.2*,OpenSSH_7.3*,OpenSSH_7.4*,OpenSSH_7.5*,OpenSSH_7.6*,OpenSSH_7.7* compat 0x04000002
> 2020-11-03T13:55:00: ssh[E]: debug1: Authenticating to 10.48.2.170:22 as 'cendio'
> 2020-11-03T13:55:00: ssh[E]: debug1: SSH2_MSG_KEXINIT sent
> 2020-11-03T13:55:00: ssh[E]: debug1: SSH2_MSG_KEXINIT received
> 2020-11-03T13:55:00: ssh[E]: debug1: kex: algorithm: curve25519-sha256
> 2020-11-03T13:55:00: ssh[E]: debug1: kex: host key algorithm: ssh-rsa
> 2020-11-03T13:55:00: ssh[E]: debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none
> 2020-11-03T13:55:00: ssh[E]: debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none
> 2020-11-03T13:55:00: ssh[E]: debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
> 2020-11-03T13:55:00: ssh[E]: debug1: Server host key: ssh-rsa SHA256:yIOEMkqDhmhaKnmM13ZPyZ79H/sgr7ySyALbIcLjSmw
> 2020-11-03T13:55:00: ssh[E]: CONFIRM HOST KEY: 10.48.2.170 10.48.2.170 22 AAAAB3NzaC1yc2EAAAADAQABAAABAQDJQ+qpDDZpuMeHtrOqG9Pl88r2q1T5JaEc+Q09qNK/a/yAV7k5rvjmia0x/HGj2yQNdcB0fRd7JiiREUYDMqXQgMn5qkYRoSIKtA3/o8Y3Zx/6E/KJsK6gz0QJV60ab+MVxk5o3YApfqmUbVmPxYwMSKlEXM3A8kzJrgwo5M4/Fas0e9Fpube5HxWsMS90LDxCRBzlCx9duc7jTjpsE2QVcXvc1dUHtPNKxiEtCYtLiWK0RniH6QGM20gtNlxGfUWFUcrLoNc7l4YxjNCcyjJhTZVJq00WDyi63TOwzUaPQ51Kj4+CWpnMm40e2ZN/TtJg7U7tjUbDrMOJcWj0p7Kb
> 2020-11-03T13:55:00: Fingerprint from server: |27:ec:75:bf:d6:ff:a4:5f:e6:0a:d7:bb:de:68:d1:ce|
> 2020-11-03T13:55:00: Known host key fingerprints:
> 2020-11-03T13:55:00:     |27:ec:75:bf:d6:ff:a4:5f:e6:0a:d7:bb:de:68:d1:ce|
> 2020-11-03T13:55:00: Acceptable host key fingerprints:
> 2020-11-03T13:55:00:     |27:ec:75:bf:d6:ff:a4:5f:e6:0a:d7:bb:de:68:d1:ce|
> 2020-11-03T13:55:00:     |4a:72:1d:a1:8d:83:93:d4:ad:d8:7c:bb:ea:87:97:42|
> 2020-11-03T13:55:00: Given host key matches one in the acceptable list.
> 2020-11-03T13:55:00: ssh[E]: debug1: rekey out after 134217728 blocks
> 2020-11-03T13:55:00: ssh[E]: debug1: SSH2_MSG_NEWKEYS sent
> 2020-11-03T13:55:00: ssh[E]: debug1: expecting SSH2_MSG_NEWKEYS
> 2020-11-03T13:55:00: ssh[E]: debug1: SSH2_MSG_NEWKEYS received
> 2020-11-03T13:55:00: ssh[E]: debug1: rekey in after 134217728 blocks
> 2020-11-03T13:55:00: ssh[E]: debug1: Will attempt key: /home/ossman/.thinlinc/id_rsa 
> 2020-11-03T13:55:00: ssh[E]: debug1: Will attempt key: /home/ossman/.thinlinc/id_dsa 
> 2020-11-03T13:55:00: ssh[E]: debug1: Will attempt key: /home/ossman/.thinlinc/id_ecdsa 
> 2020-11-03T13:55:00: ssh[E]: debug1: Will attempt key: /home/ossman/.thinlinc/id_ecdsa_sk 
> 2020-11-03T13:55:00: ssh[E]: debug1: Will attempt key: /home/ossman/.thinlinc/id_ed25519 
> 2020-11-03T13:55:00: ssh[E]: debug1: Will attempt key: /home/ossman/.thinlinc/id_ed25519_sk 
> 2020-11-03T13:55:00: ssh[E]: debug1: Will attempt key: /home/ossman/.thinlinc/id_xmss 
> 2020-11-03T13:55:00: ssh[E]: debug1: SSH2_MSG_EXT_INFO received
> 2020-11-03T13:55:00: ssh[E]: debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521>
> 2020-11-03T13:55:00: ssh[E]: debug1: SSH2_MSG_SERVICE_ACCEPT received
> 2020-11-03T13:55:00: ssh[E]: NEXT AUTHMETHOD: none
> 2020-11-03T13:55:00: ssh[E]: AUTH FAILURE
> 2020-11-03T13:55:00: ssh[E]: debug1: Authentications that can continue: publickey,password
> 2020-11-03T13:55:00: ssh[E]: NEXT AUTHMETHOD: password
> 2020-11-03T13:55:00: ssh[E]: PASSWORD: cendio 10.48.2.170
> 2020-11-03T13:55:00: ssh[E]: AUTH SUCCESS
> 2020-11-03T13:55:00: ssh[E]: debug1: Authentication succeeded (password).
> 2020-11-03T13:55:00: ssh[E]: Authenticated to 10.48.2.170 ([10.48.2.170]:22).
> 2020-11-03T13:55:00: ssh[E]: debug1: Local connections to LOCALHOST:44759 forwarded to remote address 127.0.0.1:5911
> 2020-11-03T13:55:00: ssh[E]: debug1: Local forwarding listening on ::1 port 44759.
> 2020-11-03T13:55:00: ssh[E]: debug1: channel 0: new [port listener]
> 2020-11-03T13:55:00: ssh[E]: debug1: Local forwarding listening on 127.0.0.1 port 44759.
> 2020-11-03T13:55:00: ssh[E]: debug1: channel 1: new [port listener]
> 2020-11-03T13:55:00: ssh[E]: debug1: Remote connections from LOCALHOST:5015 forwarded to local address 127.0.0.1:37017
> 2020-11-03T13:55:00: ssh[E]: debug1: Remote connections from LOCALHOST:5016 forwarded to local address 127.0.0.1:41531
> 2020-11-03T13:55:00: ssh[E]: debug1: Remote connections from LOCALHOST:5014 forwarded to local address 127.0.0.1:43299
> 2020-11-03T13:55:00: ssh[E]: debug1: Remote connections from LOCALHOST:5013 forwarded to local address 127.0.0.1:43747
> 2020-11-03T13:55:00: ssh[E]: debug1: ssh_init_forwarding: expecting replies for 3 forwards
> 2020-11-03T13:55:00: ssh[E]: debug1: channel 2: new [client-session]
> 2020-11-03T13:55:00: ssh[E]: CONNECTED
> 2020-11-03T13:55:00: ssh[E]: debug1: Requesting no-more-sessions@openssh.com
> 2020-11-03T13:55:00: ssh[E]: debug1: Entering interactive session.
> 2020-11-03T13:55:00: ssh[E]: debug1: pledge: network
> 2020-11-03T13:55:01: ssh[E]: debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0
> 2020-11-03T13:55:01: ssh[E]: debug1: Remote: Server has disabled port forwarding.
> 2020-11-03T13:55:01: ssh[E]: debug1: remote forward failure for: listen 5015, connect 127.0.0.1:37017
> 2020-11-03T13:55:01: ssh[E]: Warning: remote port forwarding failed for listen port 5015
> 2020-11-03T13:55:01: ssh[E]: debug1: Remote: Server has disabled port forwarding.
> 2020-11-03T13:55:01: ssh[E]: debug1: remote forward failure for: listen 5016, connect 127.0.0.1:41531
> 2020-11-03T13:55:01: ssh[E]: Warning: remote port forwarding failed for listen port 5016
> 2020-11-03T13:55:01: ssh[E]: debug1: Remote: Server has disabled port forwarding.
> 2020-11-03T13:55:01: ssh[E]: debug1: remote forward failure for: listen 5014, connect 127.0.0.1:43299
> 2020-11-03T13:55:01: ssh[E]: Warning: remote port forwarding failed for listen port 5014
> 2020-11-03T13:55:01: ssh[E]: debug1: forwarding_success: all expected forwarding replies received
> 2020-11-03T13:55:01: ssh[E]: debug1: Remote: Server has disabled port forwarding.
> 2020-11-03T13:55:01: ssh[E]: debug1: remote forward failure for: listen 5013, connect 127.0.0.1:43747
> 2020-11-03T13:55:01: ssh[E]: Warning: remote port forwarding failed for listen port 5013
> 2020-11-03T13:55:01: ssh[E]: debug1: Sending command: thinlinc-login dummy
> 2020-11-03T13:55:01: ssh[E]: debug1: client_input_channel_req: channel 2 rtype exit-status reply 0
> 2020-11-03T13:55:01: ssh[E]: debug1: client_input_channel_req: channel 2 rtype eow@openssh.com reply 0
> 2020-11-03T13:55:01: ssh[E]: 
> 2020-11-03T13:55:01: ssh[E]: COMMAND_EXITSTATUS: 254
> 2020-11-03T13:55:01: ssh: Too many logins for 'cendio'.
> 2020-11-03T13:55:01: ServiceProcess: Recieved EOF on fd 11 for service ssh
> 2020-11-03T13:55:01: vncviewer[E]: 
> 2020-11-03T13:55:01: vncviewer[E]: ThinLinc Client 64-bit v4.12.0post
> 2020-11-03T13:55:01: vncviewer[E]: Built on: 2020-09-24 01:27
> 2020-11-03T13:55:01: vncviewer[E]: Copyright (C) 1999-2020 TigerVNC Team and many others
> 2020-11-03T13:55:01: vncviewer[E]: See included EULA.txt for licensing details.
> 2020-11-03T13:55:01: vncviewer[E]: See http://www.cendio.com for information on ThinLinc.
> 2020-11-03T13:55:01: vncviewer[E]: 
> 2020-11-03T13:55:01: vncviewer[E]: Tue Nov  3 13:55:01 2020
> 2020-11-03T13:55:01: vncviewer[E]:  DecodeManager: Detected 12 CPU core(s)
> 2020-11-03T13:55:01: vncviewer[E]:  DecodeManager: Creating 4 decoder thread(s)
> 2020-11-03T13:55:01: ssh[E]: debug1: Connection to port 44759 forwarding to 127.0.0.1 port 5911 requested.
> 2020-11-03T13:55:01: vncviewer[E]:  CConn:       Connected to host 127.0.0.1 port 44759
> 2020-11-03T13:55:01: ssh[E]: debug1: channel 2: new [direct-tcpip]
> 2020-11-03T13:55:01: ssh[E]: channel 2: open failed: administratively prohibited: open failed
> 2020-11-03T13:55:01: ssh[E]: debug1: channel 2: free: direct-tcpip: listening port 44759 for 127.0.0.1 port 5911, connect from 127.0.0.1 port 59580 to 127.0.0.1 port 44759, nchannels 3
> 2020-11-03T13:55:01: vncviewer[E]:  CConn:       End of stream
> 2020-11-03T13:55:01: ServiceProcess: Recieved EOF on fd 21 for service vncviewer
> 2020-11-03T13:55:01: Process 3963730 exited with code 0
> 2020-11-03T13:55:19: Log file ended

Note You need to log in before you can comment on or make changes to this bug.