Bugzilla – Attachment 1137 Details for
Bug 1189
PAM module hangs root logout
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
Debug output from client
client debug output (text/plain), 7.88 KB, created by
William Knox
on 2006-05-16 06:49:48 AEST
(
hide
)
Description:
Debug output from client
Filename:
MIME Type:
Creator:
William Knox
Created:
2006-05-16 06:49:48 AEST
Size:
7.88 KB
patch
obsolete
>Script started on Mon May 15 15:06:56 2006 >oraadm:~/src/build$ sudo openssh-4.3p2/ssh -v -v -v -x -p 2222 corpdev2 date >OpenSSH_4.3p2, OpenSSL 0.9.7g 11 Apr 2005 >debug1: Reading configuration data /usr/local/etc/ssh_config >debug2: ssh_connect: needpriv 0 >debug1: Connecting to corpdev2 [XXX.XX.XX.XXX] port 2222. >debug2: fd 4 setting O_NONBLOCK >debug1: fd 4 clearing O_NONBLOCK >debug1: Connection established. >debug1: permanently_set_uid: 0/1 >debug1: identity file /root/.ssh/identity type 0 >debug3: Not a RSA1 key file /root/.ssh/id_rsa. >debug2: key_type_from_name: unknown key type '-----BEGIN' >debug3: key_read: missing keytype >debug2: key_type_from_name: unknown key type 'Proc-Type:' >debug3: key_read: missing keytype >debug2: key_type_from_name: unknown key type 'DEK-Info:' >debug3: key_read: missing keytype >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug2: key_type_from_name: unknown key type '-----END' >debug3: key_read: missing keytype >debug1: identity file /root/.ssh/id_rsa type 1 >debug1: identity file /root/.ssh/id_dsa type -1 >debug1: Remote protocol version 1.99, remote software version OpenSSH_4.3 >debug1: match: OpenSSH_4.3 pat OpenSSH* >debug1: Enabling compatibility mode for protocol 2.0 >debug1: Local version string SSH-2.0-OpenSSH_4.3 >debug2: fd 4 setting O_NONBLOCK >debug1: SSH2_MSG_KEXINIT sent >debug1: SSH2_MSG_KEXINIT received >debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 >debug2: kex_parse_kexinit: ssh-rsa,ssh-dss >debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr >debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib >debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: first_kex_follows 0 >debug2: kex_parse_kexinit: reserved 0 >debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 >debug2: kex_parse_kexinit: ssh-rsa,ssh-dss >debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr >debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: none,zlib@openssh.com >debug2: kex_parse_kexinit: none,zlib@openssh.com >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: first_kex_follows 0 >debug2: kex_parse_kexinit: reserved 0 >debug2: mac_init: found hmac-md5 >debug1: kex: server->client aes128-cbc hmac-md5 none >debug2: mac_init: found hmac-md5 >debug1: kex: client->server aes128-cbc hmac-md5 none >debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent >debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP >debug2: dh_gen_key: priv key bits set: 133/256 >debug2: bits set: 512/1024 >debug1: SSH2_MSG_KEX_DH_GEX_INIT sent >debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY >debug3: check_host_in_hostfile: filename /root/.ssh/known_hosts >debug3: check_host_in_hostfile: filename /usr/local/etc/ssh_known_hosts >debug2: key_type_from_name: unknown key type '1024' >debug3: key_read: missing keytype >debug3: key_read: type mismatch >debug3: check_host_in_hostfile: match line 56 >debug3: check_host_in_hostfile: filename /root/.ssh/known_hosts >debug3: check_host_in_hostfile: filename /usr/local/etc/ssh_known_hosts >debug2: key_type_from_name: unknown key type '1024' >debug3: key_read: missing keytype >debug3: key_read: type mismatch >debug3: check_host_in_hostfile: match line 56 >debug1: Host 'corpdev2' is known and matches the RSA host key. >debug1: Found key in /usr/local/etc/ssh_known_hosts:56 >debug2: bits set: 507/1024 >debug1: ssh_rsa_verify: signature correct >debug2: kex_derive_keys >debug2: set_newkeys: mode 1 >debug1: SSH2_MSG_NEWKEYS sent >debug1: expecting SSH2_MSG_NEWKEYS >debug2: set_newkeys: mode 0 >debug1: SSH2_MSG_NEWKEYS received >debug1: SSH2_MSG_SERVICE_REQUEST sent >debug2: service_accept: ssh-userauth >debug1: SSH2_MSG_SERVICE_ACCEPT received >debug2: key: /root/.ssh/id_rsa (11dbb0) >debug2: key: /root/.ssh/id_dsa (0) >debug1: Authentications that can continue: publickey,password >debug3: start over, passed a different list publickey,password >debug3: preferred publickey,keyboard-interactive,password >debug3: authmethod_lookup publickey >debug3: remaining preferred: keyboard-interactive,password >debug3: authmethod_is_enabled publickey >debug1: Next authentication method: publickey >debug1: Offering public key: /root/.ssh/id_rsa >debug3: send_pubkey_test >debug2: we sent a publickey packet, wait for reply >debug1: Server accepts key: pkalg ssh-rsa blen 149 >debug2: input_userauth_pk_ok: fp ab:c5:bb:b7:ec:5f:4e:60:80:e8:08:d0:e3:f0:42:98 >debug3: sign_and_send_pubkey >debug1: PEM_read_PrivateKey failed >debug1: read PEM private key done: type <unknown> >Enter passphrase for key '/root/.ssh/id_rsa': >debug1: read PEM private key done: type RSA >debug1: Authentication succeeded (publickey). >debug1: channel 0: new [client-session] >debug3: ssh_session2_open: channel_new: 0 >debug2: channel 0: send open >debug1: Entering interactive session. >debug2: callback start >debug2: client_session2_setup: id 0 >debug1: Sending command: date >debug2: channel 0: request exec confirm 0 >debug2: callback done >debug2: channel 0: open confirm rwindow 0 rmax 32768 >debug2: channel 0: rcvd adjust 131072 >debug2: channel 0: rcvd ext data 30 >debug2: channel 0: rcvd ext data 41 >debug2: channel 0: rcvd ext data 34 >debug2: channel 0: rcvd ext data 13 >debug2: channel 0: rcvd ext data 29 >debug2: channel 0: rcvd ext data 105 >debug2: channel 0: rcvd ext data 156 >debug2: channel 0: rcvd eof >debug2: channel 0: output open -> drain >Mon May 15 15:07:11 EDT 2006 >debug3: PAM: opening session >debug1: PAM: reinitializing credentials >debug1: permanently_set_uid: 0/1 >Environment: > USER=root > LOGNAME=root > HOME=/root > PATH=/usr/bin:/bin:/usr/sbin:/sbin:/usr/local/bin > MAIL=/var/mail//root > SHELL=/sbin/sh > TZ=US/Eastern > SSH_CLIENT=XXX.XX.XX.XX 46216 2222 > SSH_CONNECTION=XXX.XX.XX.XX 46216 XXX.XX.XX.XXX 2222 >debug3: channel 0: close_fds r -1 w -1 e -1 c -1 >debug2: channel 0: written 408 to efd 7 >debug2: channel 0: obuf empty >debug2: channel 0: close_write >debug2: channel 0: output drain -> closed >---- ># Hangs here indefinitely - Ctrl-C to exit >---- >debug1: channel 0: free: client-session, nchannels 1 >debug3: channel 0: status: The following connections are open: > #0 client-session (t4 r0 i0/0 o3/0 fd 5/-1 cfd -1) > >debug3: channel 0: close_fds r 5 w -1 e 7 c -1 >Killed by signal 2. >oraadm:~/src/build$ exit > >script done on Mon May 15 15:08:05 2006
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1189
:
1133
|
1134
|
1135
|
1136
| 1137 |
1138
|
1140
|
1141