Bugzilla – Attachment 2166 Details for
Bug 2022
ssh segfaults when using ldns, SSHFP, a DNSSEC-enabled resolver and a CNAME
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
Short example
example (text/plain), 2.77 KB, created by
gregdlg+mr
on 2012-06-26 14:03:32 AEST
(
hide
)
Description:
Short example
Filename:
MIME Type:
Creator:
gregdlg+mr
Created:
2012-06-26 14:03:32 AEST
Size:
2.77 KB
patch
obsolete
>> dig SSHFP +dnssec sshtest.ntl.nc > >; <<>> DiG 9.9.1-P1 <<>> SSHFP +dnssec sshtest.ntl.nc >;; global options: +cmd >;; Got answer: >;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 27632 >;; flags: qr rd ra ad; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1 > >;; OPT PSEUDOSECTION: >; EDNS: version: 0, flags: do; udp: 4096 >;; QUESTION SECTION: >;sshtest.ntl.nc. IN SSHFP > >;; ANSWER SECTION: >sshtest.ntl.nc. 19 IN SSHFP 1 1 EF117488DC7FC9272818EDC4BE01C30A9A418A03 >sshtest.ntl.nc. 19 IN SSHFP 2 1 870892EE9D8ED71115FB54C18A4982FB4F91CF7B >sshtest.ntl.nc. 19 IN RRSIG SSHFP 8 3 600 20120726014138 20120626014138 48528 ntl.nc. EB88BakV24bwjYnm2ZjO0Tw8tBL/xlage/GbVrrhHKEpzLQbfyj1jyLG 1aYlOjfJcq0YeFKP6l5KM3aQRg1Wo/+pTr80upG+luIKqK+FM4XhATOg +/lSTxAJtlcK4QzWYUCPyLYod8rhi2qERHF2Pv+8b0DIFiHqSg/oPdu2 Nto= > >;; Query time: 6 msec >;; SERVER: 115.126.160.14#53(115.126.160.14) >;; WHEN: Tue Jun 26 14:13:18 2012 >;; MSG SIZE rcvd: 277 > >> dig SSHFP +dnssec sshtestcname.ntl.nc > >; <<>> DiG 9.9.1-P1 <<>> SSHFP +dnssec sshtestcname.ntl.nc >;; global options: +cmd >;; Got answer: >;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 999 >;; flags: qr rd ra ad; QUERY: 1, ANSWER: 5, AUTHORITY: 0, ADDITIONAL: 1 > >;; OPT PSEUDOSECTION: >; EDNS: version: 0, flags: do; udp: 4096 >;; QUESTION SECTION: >;sshtestcname.ntl.nc. IN SSHFP > >;; ANSWER SECTION: >sshtestcname.ntl.nc. 60 IN CNAME sshtest.ntl.nc. >sshtestcname.ntl.nc. 60 IN RRSIG CNAME 8 3 600 20120726014138 20120626014138 48528 ntl.nc. MvNp4AH0l5fFbRtLzZCwjMgJ9pU66dxs58/aOtgNGRVSyqrAEZ7nGwx8 3ncaStU6UpbBGg0jEw9S2fficNjIOfm/gLl5eShI9K4WgU3cdQC3F8Xc IBtF20UdD655EsSF/aZXrsB9piV3EEED9PfirKbjuNZAaCKlrmeLVlCm s2I= >sshtest.ntl.nc. 39 IN SSHFP 2 1 870892EE9D8ED71115FB54C18A4982FB4F91CF7B >sshtest.ntl.nc. 39 IN SSHFP 1 1 EF117488DC7FC9272818EDC4BE01C30A9A418A03 >sshtest.ntl.nc. 39 IN RRSIG SSHFP 8 3 600 20120726014138 20120626014138 48528 ntl.nc. EB88BakV24bwjYnm2ZjO0Tw8tBL/xlage/GbVrrhHKEpzLQbfyj1jyLG 1aYlOjfJcq0YeFKP6l5KM3aQRg1Wo/+pTr80upG+luIKqK+FM4XhATOg +/lSTxAJtlcK4QzWYUCPyLYod8rhi2qERHF2Pv+8b0DIFiHqSg/oPdu2 Nto= > >;; Query time: 6 msec >;; SERVER: 115.126.160.14#53(115.126.160.14) >;; WHEN: Tue Jun 26 14:12:58 2012 >;; MSG SIZE rcvd: 470 > >> ssh sshtest.ntl.nc >The authenticity of host 'sshtest.ntl.nc (46.19.33.142)' can't be established. >RSA key fingerprint is bb:11:6c:30:c6:a0:d3:db:e1:c2:50:61:03:60:c8:42. >+--[ RSA 2048]----+ >|=E..*. | >|+. = + | >|. + . * | >| + = = | >| + o S | >| . . o | >| o | >| o | >| . | >+-----------------+ >Matching host key fingerprint found in DNS. >Are you sure you want to continue connecting (yes/no)? > >> ssh sshtestcname.ntl.nc >zsh: segmentation fault ssh sshtestcname.ntl.nc >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 2022
: 2166 |
2167