Solved

SSH Login: No Promt for User ID from Linux

Posted on 2011-02-24
6
516 Views
Last Modified: 2012-08-14
The Telnet client is Tera Term. To connect the IP and port (22 for my host 1&1) are used. The terminal ID is VT100 (default).

The connection seems to be made. However, no prompt for user ID. All that is displayed is

SSH-2.0-OpenSSH

with the cursor below. I have never done this before, so I'm probably missing something obvious.

Please let me know if more info is needed.

Thank you.
0
Comment
Question by:bobcann
  • 2
  • 2
  • 2
6 Comments
 
LVL 82

Accepted Solution

by:
Dave Baldwin earned 334 total points
ID: 34976541
That means you're not in SSH mode.  If you were, it would negotiate for a secure connection and you'd get the login prompt.  Which Linux is the user trying to log in from?  Ubuntu?  RedHat?
0
 

Author Comment

by:bobcann
ID: 34976695
It's a PC running Windows XP used to log into a Linux server. I don't know what it is. I'm browsing their control panel, but don't see what Linux it is.
0
 
LVL 82

Assisted Solution

by:Dave Baldwin
Dave Baldwin earned 334 total points
ID: 34977330
Then try PuTTY http://www.chiark.greenend.org.uk/~sgtatham/putty/, that's what I use.
0
Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

 
LVL 68

Assisted Solution

by:woolmilkporc
woolmilkporc earned 166 total points
ID: 34977812
Hi,

you're obviously using telnet (TTERMPRO) to reach port 22, which is wrong.
You must use TTSSH instead of TTERMPRO.

wmp

0
 
LVL 68

Expert Comment

by:woolmilkporc
ID: 34977825
Read how to use Teraterm with ssh (TTSSH) here:

http://ttssh2.sourceforge.jp/manual/en/commandline/ttssh.html

wmp
0
 

Author Closing Comment

by:bobcann
ID: 34984235
You are all correct. I'm now using Bitvise xTerm with complete success. I tried Putty and it connected, but I could not type my password at the prompt. No doubt some misbehavior on my PC.

Thanks to all.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Daily system administration tasks often require administrators to connect remote systems. But allowing these remote systems to accept passwords makes these systems vulnerable to the risk of brute-force password guessing attacks. Furthermore there ar…
SSH (Secure Shell) - Tips and Tricks As you all know SSH(Secure Shell) is a network protocol, which we use to access/transfer files securely between two networked devices. SSH was actually designed as a replacement for insecure protocols that sen…
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
Learn how to navigate the file tree with the shell. Use pwd to print the current working directory: Use ls to list a directory's contents: Use cd to change to a new directory: Use wildcards instead of typing out long directory names: Use ../ to move…

747 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now