Bugzilla – Attachment 2091 Details for
Bug 1939
ssh client hangs when -t option is used to force pseudo-tty allocation
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
ssh client verbose session
ssh force tty-allocation.txt (text/plain), 11.25 KB, created by
mathews.dennis
on 2011-09-20 11:17:02 AEST
(
hide
)
Description:
ssh client verbose session
Filename:
MIME Type:
Creator:
mathews.dennis
Created:
2011-09-20 11:17:02 AEST
Size:
11.25 KB
patch
obsolete
>ssh -vvv -t myhost 'uname -a' >Sun_SSH_1.1.4, SSH protocols 1.5/2.0, OpenSSL 0x0090704f >debug1: Reading configuration data /etc/ssh/ssh_config >debug1: Rhosts Authentication disabled, originating port will not be trusted. >debug1: ssh_connect: needpriv 0 >debug1: Connecting to myhost [155.60.214.90] port 22. >debug1: Connection established. >debug1: identity file /home/user1/.ssh/identity type -1 >debug3: Not a RSA1 key file /home/user1/.ssh/id_rsa. >debug2: key_type_from_name: unknown key type '-----BEGIN' >debug3: key_read: no key found >debug2: key_type_from_name: unknown key type 'Proc-Type:' >debug3: key_read: no key found >debug2: key_type_from_name: unknown key type 'DEK-Info:' >debug3: key_read: no key found >debug3: key_read: no space >debug3: key_read: no space >debug3: key_read: no space >debug3: key_read: no space >debug3: key_read: no space >debug3: key_read: no space >debug3: key_read: no space >debug3: key_read: no space >debug3: key_read: no space >debug3: key_read: no space >debug3: key_read: no space >debug3: key_read: no space >debug3: key_read: no space >debug2: key_type_from_name: unknown key type '-----END' >debug3: key_read: no key found >debug1: identity file /home/user1/.ssh/id_rsa type 1 >debug3: Not a RSA1 key file /home/user1/.ssh/id_dsa. >debug2: key_type_from_name: unknown key type '-----BEGIN' >debug3: key_read: no key found >debug2: key_type_from_name: unknown key type 'Proc-Type:' >debug3: key_read: no key found >debug2: key_type_from_name: unknown key type 'DEK-Info:' >debug3: key_read: no key found >debug3: key_read: no space >debug3: key_read: no space >debug3: key_read: no space >debug3: key_read: no space >debug3: key_read: no space >debug3: key_read: no space >debug3: key_read: no space >debug3: key_read: no space >debug3: key_read: no space >debug3: key_read: no space >debug2: key_type_from_name: unknown key type '-----END' >debug3: key_read: no key found >debug1: identity file /home/user1/.ssh/id_dsa type 2 >debug1: Logging to host: myhost >debug1: Local user: user1 Remote user: user1 >debug1: Remote protocol version 2.0, remote software version OpenSSH_5.4 >debug1: match: OpenSSH_5.4 pat OpenSSH* >debug1: Enabling compatibility mode for protocol 2.0 >debug1: Local version string SSH-2.0-Sun_SSH_1.1.4 >debug1: use_engine is 'yes' >debug1: pkcs11 engine initialized, now setting it as default for RSA, DSA, and symmetric ciphers >debug1: pkcs11 engine initialization complete >debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 >debug2: kex_parse_kexinit: ssh-rsa,ssh-dss >debug2: kex_parse_kexinit: aes128-ctr,aes128-cbc,arcfour,3des-cbc,blowfish-cbc,aes192-ctr,aes192-cbc,aes256-ctr,aes256-cbc >debug2: kex_parse_kexinit: aes128-ctr,aes128-cbc,arcfour,3des-cbc,blowfish-cbc,aes192-ctr,aes192-cbc,aes256-ctr,aes256-cbc >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: none,zlib >debug2: kex_parse_kexinit: none,zlib >debug2: kex_parse_kexinit: i-default >debug2: kex_parse_kexinit: i-default >debug2: kex_parse_kexinit: first_kex_follows 0 >debug2: kex_parse_kexinit: reserved 0 >debug1: Failed to acquire GSS-API credentials for any mechanisms (No credentials were supplied, or the credentials were unavailable or inaccessible >Unknown code 0 >) >debug1: SSH2_MSG_KEXINIT sent >debug3: kex_reset_dispatch -- should we dispatch_set(KEXINIT) here? 0 && !0 >debug1: SSH2_MSG_KEXINIT received >debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 >debug2: kex_parse_kexinit: ssh-rsa,ssh-dss >debug2: kex_parse_kexinit: aes128-ctr,aes128-cbc,arcfour,3des-cbc,blowfish-cbc,aes192-ctr,aes192-cbc,aes256-ctr,aes256-cbc >debug2: kex_parse_kexinit: aes128-ctr,aes128-cbc,arcfour,3des-cbc,blowfish-cbc,aes192-ctr,aes192-cbc,aes256-ctr,aes256-cbc >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: none,zlib >debug2: kex_parse_kexinit: none,zlib >debug2: kex_parse_kexinit: i-default >debug2: kex_parse_kexinit: i-default >debug2: kex_parse_kexinit: first_kex_follows 0 >debug2: kex_parse_kexinit: reserved 0 >debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 >debug2: kex_parse_kexinit: ssh-rsa,ssh-dss >debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se >debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: none,zlib@openssh.com >debug2: kex_parse_kexinit: none,zlib@openssh.com >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: first_kex_follows 0 >debug2: kex_parse_kexinit: reserved 0 >debug2: mac_init: found hmac-md5 >debug1: kex: server->client aes128-ctr hmac-md5 none >debug2: mac_init: found hmac-md5 >debug1: kex: client->server aes128-ctr hmac-md5 none >debug1: Peer sent proposed langtags, ctos: >debug1: Peer sent proposed langtags, stoc: >debug1: We proposed langtags, ctos: i-default >debug1: We proposed langtags, stoc: i-default >debug1: SSH2_MSG_KEX_DH_GEX_REQUEST sent >debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP >debug1: dh_gen_key: priv key bits set: 135/256 >debug1: bits set: 1030/2048 >debug1: SSH2_MSG_KEX_DH_GEX_INIT sent >debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY >debug3: check_host_in_hostfile: filename /home/user1/.ssh/known_hosts >debug3: check_host_in_hostfile: match line 52 >debug3: check_host_in_hostfile: filename /home/user1/.ssh/known_hosts >debug3: check_host_in_hostfile: match line 52 >debug1: Host 'myhost' is known and matches the RSA host key. >debug1: Found key in /home/user1/.ssh/known_hosts:52 >debug1: bits set: 1027/2048 >debug1: ssh_rsa_verify: signature correct >debug2: kex_derive_keys >debug3: kex_reset_dispatch -- should we dispatch_set(KEXINIT) here? 0 && !0 >debug1: newkeys: mode 1 >debug1: set_newkeys: setting new keys for 'out' mode >debug3: aes-128-ctr NID found >debug1: SSH2_MSG_NEWKEYS sent >debug1: expecting SSH2_MSG_NEWKEYS >debug1: newkeys: mode 0 >debug1: set_newkeys: setting new keys for 'in' mode >debug3: aes-128-ctr NID found >debug1: SSH2_MSG_NEWKEYS received >debug1: done: ssh_kex2. >debug1: send SSH2_MSG_SERVICE_REQUEST >debug2: service_accept: ssh-userauth >debug1: got SSH2_MSG_SERVICE_ACCEPT >debug3: input_userauth_banner >############################################################ > > This computer system is the property of **** Limited. > > Unauthorised access is prohibited. > > Use of this system is subject to the **** Information > Security policies. This system may be monitored at any time. > The ueers will be responsible for their use. > > LOG OFF IMMEDIATELY if you do not accept these conditions. > >############################################################ >debug1: Authentications that can continue: publickey,password >debug3: start over, passed a different list publickey,password >debug3: preferred gssapi-keyex,gssapi-with-mic,publickey,keyboard-interactive,password >debug3: authmethod_lookup publickey >debug3: remaining preferred: keyboard-interactive,password >debug3: authmethod_is_enabled publickey >debug1: Next authentication method: publickey >debug2: userauth_pubkey_agent: no keys at all >debug2: userauth_pubkey_agent: no more keys >debug2: userauth_pubkey_agent: no message sent >debug1: Trying private key: /home/user1/.ssh/identity >debug3: no such identity: /home/user1/.ssh/identity >debug1: Trying public key: /home/user1/.ssh/id_rsa >debug3: send_pubkey_test >debug2: we sent a publickey packet, wait for reply >debug1: Authentications that can continue: publickey,password >debug2: userauth_pubkey_agent: no more keys >debug2: userauth_pubkey_agent: no message sent >debug1: Trying public key: /home/user1/.ssh/id_dsa >debug3: send_pubkey_test >debug2: we sent a publickey packet, wait for reply >debug1: Server accepts key: pkalg ssh-dss blen 433 lastkey 6f0c0 hint 2 >debug2: input_userauth_pk_ok: fp 68:d0:8e:f9:30:d0:6a:36:08:80:63:a8:2e:36:e9:78 >debug3: sign_and_send_pubkey >debug1: PEM_read_PrivateKey failed >debug1: read PEM private key done: type <unknown> >Enter passphrase for key '/home/user1/.ssh/id_dsa': >debug1: read PEM private key done: type DSA >debug1: Authentication succeeded (publickey) >debug1: channel 0: new [client-session] >debug3: ssh_session2_open: channel_new: 0 >debug1: send channel open 0 >debug1: Entering interactive session. >debug2: callback start >debug1: ssh_session2_setup: id 0 >debug1: channel request 0: env >debug2: Sent request for environment variable LANG=en_AU.UTF-8 >debug1: channel request 0: env >debug2: Sent request for environment variable LC_CTYPE=en_AU.ISO8859-1 >debug1: channel request 0: env >debug2: Sent request for environment variable LC_COLLATE=en_AU.ISO8859-1 >debug1: channel request 0: env >debug2: Sent request for environment variable LC_TIME=en_AU.ISO8859-1 >debug1: channel request 0: env >debug2: Sent request for environment variable LC_NUMERIC=en_AU.ISO8859-1 >debug1: channel request 0: env >debug2: Sent request for environment variable LC_MONETARY=en_AU.ISO8859-1 >debug1: channel request 0: env >debug2: Sent request for environment variable LC_MESSAGES=C >debug1: channel request 0: pty-req >debug3: tty_make_modes: ospeed 38400 >debug3: tty_make_modes: ispeed 38400 >debug3: tty_make_modes: 1 3 >debug3: tty_make_modes: 2 28 >debug3: tty_make_modes: 3 127 >debug3: tty_make_modes: 4 21 >debug3: tty_make_modes: 5 4 >debug3: tty_make_modes: 6 255 >debug3: tty_make_modes: 7 255 >debug3: tty_make_modes: 8 17 >debug3: tty_make_modes: 9 19 >debug3: tty_make_modes: 10 26 >debug3: tty_make_modes: 11 25 >debug3: tty_make_modes: 12 18 >debug3: tty_make_modes: 13 23 >debug3: tty_make_modes: 14 22 >debug3: tty_make_modes: 16 0 >debug3: tty_make_modes: 18 15 >debug3: tty_make_modes: 30 0 >debug3: tty_make_modes: 31 0 >debug3: tty_make_modes: 32 0 >debug3: tty_make_modes: 33 0 >debug3: tty_make_modes: 34 0 >debug3: tty_make_modes: 35 0 >debug3: tty_make_modes: 36 1 >debug3: tty_make_modes: 37 0 >debug3: tty_make_modes: 38 1 >debug3: tty_make_modes: 39 1 >debug3: tty_make_modes: 40 0 >debug3: tty_make_modes: 41 1 >debug3: tty_make_modes: 50 1 >debug3: tty_make_modes: 51 1 >debug3: tty_make_modes: 52 0 >debug3: tty_make_modes: 53 1 >debug3: tty_make_modes: 54 1 >debug3: tty_make_modes: 55 1 >debug3: tty_make_modes: 56 0 >debug3: tty_make_modes: 57 0 >debug3: tty_make_modes: 58 0 >debug3: tty_make_modes: 59 1 >debug3: tty_make_modes: 60 1 >debug3: tty_make_modes: 61 1 >debug3: tty_make_modes: 62 0 >debug3: tty_make_modes: 70 1 >debug3: tty_make_modes: 71 0 >debug3: tty_make_modes: 72 1 >debug3: tty_make_modes: 73 0 >debug3: tty_make_modes: 74 0 >debug3: tty_make_modes: 75 0 >debug3: tty_make_modes: 90 1 >debug3: tty_make_modes: 91 1 >debug3: tty_make_modes: 92 0 >debug3: tty_make_modes: 93 0 >debug1: Sending command: uname -a >debug1: channel request 0: exec >debug1: fd 4 setting TCP_NODELAY >debug2: callback done >debug1: channel 0: open confirm rwindow 0 rmax 32768 > >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1939
: 2091