Bugzilla – Attachment 40 Details for
Bug 160
Race condition in clientloop.c?
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
Debug output, lsof output, etc...
summary (text/plain), 43.79 KB, created by
Nicolas Williams
on 2002-03-13 09:10:10 AEDT
(
hide
)
Description:
Debug output, lsof output, etc...
Filename:
MIME Type:
Creator:
Nicolas Williams
Created:
2002-03-13 09:10:10 AEDT
Size:
43.79 KB
patch
obsolete
>******************************************************************************** >BADCLIENT -v -v -v: >client% /usr/bin/scp -P 6666 /tmp/core server:/tmp/foon >OpenSSH_2.9p2, SSH protocols 1.5/2.0, OpenSSL 0x0090600f >debug1: Reading configuration data /opt/PERssh/etc/ssh_config >debug1: Applying options for * >debug3: cipher ok: arcfour [arcfour] >debug3: ciphers ok: [arcfour] >debug1: Seeding random number generator >debug1: Rhosts Authentication disabled, originating port will not be trusted. >debug1: restore_uid >debug1: ssh_connect: getuid 12345 geteuid 0 anon 1 >debug1: Connecting to server [10.10.10.43] port 6666. >debug1: temporarily_use_uid: 12345/14 (e=0) >debug1: restore_uid >debug1: temporarily_use_uid: 12345/14 (e=0) >debug1: restore_uid >debug1: Connection established. >debug1: identity file /home/joebob/.ssh/identity type -1 >debug3: No RSA1 key file /home/joebob/.ssh/id_dsa. >debug2: key_type_from_name: unknown key type '-----BEGIN' >debug3: key_read: no key found >debug3: key_read: no space >debug3: key_read: no space >debug3: key_read: no space >debug3: key_read: no space >debug3: key_read: no space >debug3: key_read: no space >debug3: key_read: no space >debug3: key_read: no space >debug3: key_read: no space >debug3: key_read: no space >debug2: key_type_from_name: unknown key type '-----END' >debug3: key_read: no key found >debug3: key_read: here -- ret->type == 2 >debug3: key_read: reading uuencoded key >debug1: identity file /home/joebob/.ssh/id_dsa type 2 >debug1: identity file /home/joebob/.ssh/id_rsa1 type -1 >debug3: No RSA1 key file /home/joebob/.ssh/id_rsa2. >debug2: key_type_from_name: unknown key type '-----BEGIN' >debug3: key_read: no key found >debug3: key_read: no space >debug3: key_read: no space >debug3: key_read: no space >debug3: key_read: no space >debug3: key_read: no space >debug3: key_read: no space >debug3: key_read: no space >debug3: key_read: no space >debug3: key_read: no space >debug3: key_read: no space >debug3: key_read: no space >debug3: key_read: no space >debug3: key_read: no space >debug2: key_type_from_name: unknown key type '-----END' >debug3: key_read: no key found >debug3: key_read: here -- ret->type == 1 >debug3: key_read: reading uuencoded key >debug1: identity file /home/joebob/.ssh/id_rsa2 type 1 >debug1: Remote protocol version 1.99, remote software version OpenSSH_3.0.2p1_gsskeyex02 >debug1: match: OpenSSH_3.0.2p1_gsskeyex02 pat ^OpenSSH >Enabling compatibility mode for protocol 2.0 >debug1: Local version string SSH-2.0-OpenSSH_2.9p2 >SELECT: READ FD(6) >debug1: SSH2_MSG_KEXINIT sent >SELECT: READ FD(5) >debug1: SSH2_MSG_KEXINIT received >debug2: kex_parse_kexinit: gss-group1-sha1-Se3H81ismmOC3OE+FwYCiQ==,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 >debug2: kex_parse_kexinit: ssh-rsa,ssh-dss,null >debug2: kex_parse_kexinit: arcfour >debug2: kex_parse_kexinit: arcfour >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: none >debug2: kex_parse_kexinit: none >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: first_kex_follows 0 >debug2: kex_parse_kexinit: reserved 0 >debug2: kex_parse_kexinit: gss-group1-sha1-Se3H81ismmOC3OE+FwYCiQ==,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 >debug2: kex_parse_kexinit: ssh-rsa,ssh-dss >debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael128-cbc,rijndael192-cbc,rijndael256-cbc,rijndael-cbc@lysator.liu.se >debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael128-cbc,rijndael192-cbc,rijndael256-cbc,rijndael-cbc@lysator.liu.se >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: none,zlib >debug2: kex_parse_kexinit: none,zlib >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: first_kex_follows 0 >debug2: kex_parse_kexinit: reserved 0 >debug2: mac_init: found hmac-md5 >debug1: kex: server->client arcfour hmac-md5 none >debug2: mac_init: found hmac-md5 >debug1: kex: client->server arcfour hmac-md5 none >debug1: dh_gen_key: priv key bits set: 127/256 >debug1: bits set: 496/1024 >debug1: Calling gss_init_sec_context >debug1: Delegating credentials >SELECT: READ FD(6) >SELECT: READ FD(6) >SELECT: READ FD(5) >debug1: Received GSSAPI_COMPLETE >debug1: Calling gss_init_sec_context >debug1: Delegating credentials >debug1: bits set: 503/1024 >debug1: kex_derive_keys >debug1: newkeys: mode 1 >debug1: SSH2_MSG_NEWKEYS sent >debug1: waiting for SSH2_MSG_NEWKEYS >SELECT: READ FD(5) >debug1: newkeys: mode 0 >debug1: SSH2_MSG_NEWKEYS received >debug1: done: ssh_kex2. >debug1: send SSH2_MSG_SERVICE_REQUEST >SELECT: READ FD(5) >debug1: service_accept: ssh-userauth >debug1: got SSH2_MSG_SERVICE_ACCEPT >SELECT: READ FD(5) >debug1: authentications that can continue: external-keyx,gssapi,publickey,password >debug3: start over, passed a different list external-keyx,gssapi,publickey,password >debug3: preferred external-keyx,gssapi,publickey,password,keyboard-interactive >debug3: authmethod_lookup external-keyx >debug3: remaining preferred: gssapi,publickey,password,keyboard-interactive >debug3: authmethod_is_enabled external-keyx >debug1: next auth method to try is external-keyx >debug2: userauth_external >debug2: we sent a external-keyx packet, wait for reply >SELECT: READ FD(5) >debug1: ssh-userauth2 successful: method external-keyx >debug1: fd 6 setting O_NONBLOCK >debug1: fd 8 setting O_NONBLOCK >debug1: channel 0: new [client-session] >debug1: channel_new: 0 >debug1: send channel open 0 >debug1: Entering interactive session. >SELECT: READ FD(5) >SELECT: WRITE FD(5) >SELECT: READ FD(5) >debug2: callback start >debug1: client_init id 0 arg 0 >debug1: Sending command: scp -t /tmp/foon >debug2: callback done >debug1: channel 0: open confirm rwindow 0 rmax 16384 >SELECT: READ FD(5) >SELECT: WRITE FD(5) >SELECT: READ FD(5) >debug2: channel 0: rcvd adjust 32768 >SELECT: READ FD(5) >SELECT: READ FD(6) >debug2: channel 0: rcvd ext data 61 >SELECT: READ FD(5) >SELECT: READ FD(6) >SELECT: WRITE FD(9) >debug1: Setting KRB5CCNAME to FILE:/tmp/krb5cc_12345_Jy2387 >debug2: channel 0: written 61 to efd 9 >SELECT: READ FD(5) >SELECT: READ FD(6) >debug2: channel 0: rcvd ext data 15 >debug2: channel 0: rcvd ext data 156 >debug2: channel 0: rcvd ext data 114 >SELECT: READ FD(5) >SELECT: READ FD(6) >SELECT: WRITE FD(8) >SELECT: WRITE FD(9) >Environment: > KRB5CCNAME=FILE:/tmp/krb5cc_12345_Jy2387 > USER=joebob > LOGNAME=joebob > HOME=/home/joebob > PATH=/usr/bin:/bin:/usr/sbin:/sbin:/opt/PERssh/bin > MAIL=/var/mail//joebob > SHELL=/bin/csh > TZ=GB > SSH_CLIENT=10.10.10.98 51959 6666 >debug3: channel_close_fds: channel 0: r -1 w -1 e -1 >debug2: channel 0: written 285 to efd 9 >SELECT: READ FD(5) >SELECT: READ FD(6) >SELECT: READ FD(5) >SELECT: READ FD(6) >SELECT: WRITE FD(5) >SELECT: READ FD(5) >SELECT: READ FD(6) >SELECT: READ FD(5) >SELECT: READ FD(6) >SELECT: WRITE FD(8) >SELECT: READ FD(5) >SELECT: READ FD(6) >core 0% | | 0 --:-- ETASELECT: READ FD(5) >core 100% |*****************************| 2 00:00 >SELECT: READ FD(6) >SELECT: WRITE FD(5) >SELECT: READ FD(5) >SELECT: READ FD(6) >SELECT: WRITE FD(5) >SELECT: READ FD(5) >SELECT: READ FD(6) >SELECT: READ FD(5) >SELECT: READ FD(6) >SELECT: WRITE FD(8) >SELECT: READ FD(5) >SELECT: READ FD(6) >debug1: channel 0: read<=0 rfd 6 len 0 >debug1: channel 0: read failed >debug1: channel 0: input open -> drain >debug1: channel 0: close_read >debug1: channel 0: input: no drain shortcut >debug1: channel 0: ibuf empty >debug1: channel 0: input drain -> closed >debug1: channel 0: send eof >SELECT: READ FD(5) >SELECT: WRITE FD(5) >SELECT: READ FD(5) >debug1: channel 0: rcvd eof >debug1: channel 0: output open -> drain >debug1: channel 0: obuf empty >debug1: channel 0: output drain -> closed >debug1: channel 0: close_write >debug1: channel 0: send close >SELECT: READ FD(5) >SELECT: WRITE FD(5) >debug2: channel 0: no data after CLOSE >SELECT: READ FD(5) >debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 >debug1: channel 0: rcvd close >debug2: channel 0: no data after CLOSE >debug1: channel 0: is dead >debug1: channel_free: channel 0: status: The following connections are open: > #0 client-session (t4 r0 i8/0 o128/0 fd -1/-1) > >debug1: channel_free: channel 0: dettaching channel user >SELECT: READ FD(5) > >( >After ^C'ing the sshd: >Connection to somehost closed by remote host. >debug1: Transferred: stdin 0, stdout 0, stderr 49 bytes in 691.1 seconds >debug1: Bytes per second: stdin 0.0, stdout 0.0, stderr 0.1 >debug1: Exit status 0 >) > >******************************************************************************** >BADCLIENT LSOF ># /tmp/lsof -p 9194 >COMMAND PID USER FD TYPE DEVICE SIZE/OFF INODE NAME >ssh 9194 joebob cwd VDIR 85,0 512 100233 /opt/PERssh/bin >ssh 9194 joebob txt VREG 85,0 2591280 191020 /opt/PERssh/bin/real/ssh >ssh 9194 joebob txt VREG 85,0 30348 27403 /usr/lib/nss_nis.so.1 >ssh 9194 joebob txt VREG 85,0 27000 27402 /usr/lib/nss_files.so.1 >ssh 9194 joebob txt VREG 85,0 1014088 27354 /usr/lib/libc.so.1 >ssh 9194 joebob txt VREG 85,0 16936 90904 /usr/platform/sun4u/lib/libc_psr.so.1 >ssh 9194 joebob txt VREG 85,0 19304 27374 /usr/lib/libmp.so.2 >ssh 9194 joebob txt VREG 85,0 721916 27446 /usr/lib/libnsl.so.1 >ssh 9194 joebob txt VREG 85,0 53656 27386 /usr/lib/libsocket.so.1 >ssh 9194 joebob txt VREG 85,0 92952 27380 /usr/lib/libresolv.so.2 >ssh 9194 joebob txt VREG 85,0 20112 27751 /usr/lib/selecttest.so >ssh 9194 joebob txt VREG 85,0 4280 27351 /usr/lib/libdl.so.1 >ssh 9194 joebob txt VREG 85,0 166196 27350 /usr/lib/ld.so.1 >ssh 9194 joebob 0u FIFO 0x6256d5c0 0t0 7086255 PIPE->0x6256d644 >ssh 9194 joebob 1u FIFO 0x620ee224 0t1 7086256 PIPE->0x620ee1a0 >ssh 9194 joebob 2u VCHR 24,9 0t127763 32126 /devices/pseudo/pts@0:9->ttcompat->ldterm->ptem->pts >ssh 9194 joebob 3r DOOR 0x729dd6a0 (FA:->0x623e0480) >ssh 9194 joebob 4u inet 0x62d889f0 0t0 UDP *:33836 (Idle) >ssh 9194 joebob 5u inet 0x6baffc70 0t4266 TCP somehost:51959->someotherhost:6666 (ESTABLISHED) >ssh 9194 joebob 7u VCHR 22,0 0t1114 31874 /devices/pseudo/sy@0:tty > > >******************************************************************************** >BADSERVER -d -d -d: >server# /opt/PERssh/sbin/sshd -p 6666 -d -d -d >debug1: Seeding random number generator >debug1: sshd version OpenSSH_3.0.2p1_gsskeyex02 >debug1: private host key: #0 type 0 RSA1 >debug3: Not a RSA1 key file /opt/PERssh/etc/ssh_host_rsa_key. >debug1: read PEM private key done: type RSA >debug1: private host key: #1 type 1 RSA >debug3: Not a RSA1 key file /opt/PERssh/etc/ssh_host_dsa_key. >debug1: read PEM private key done: type DSA >debug1: private host key: #2 type 2 DSA >debug1: Bind to port 6666 on 0.0.0.0. >Server listening on 0.0.0.0 port 6666. >Generating 768 bit RSA key. >RSA key generation complete. >debug1: Server will not fork when running in debugging mode. >Connection from 10.10.10.98 port 51959 >debug1: Client protocol version 2.0; client software version OpenSSH_2.9p2 >debug1: match: OpenSSH_2.9p2 pat ^OpenSSH_2\.9 >Enabling compatibility mode for protocol 2.0 >debug1: Local version string SSH-1.99-OpenSSH_3.0.2p1_gsskeyex02 >debug1: Rhosts Authentication disabled, originating port 51959 not trusted. >debug1: list_hostkey_types: ssh-rsa,ssh-dss >debug1: SSH2_MSG_KEXINIT sent >debug1: SSH2_MSG_KEXINIT received >debug2: kex_parse_kexinit: gss-group1-sha1-Se3H81ismmOC3OE+FwYCiQ==,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 >debug2: kex_parse_kexinit: ssh-rsa,ssh-dss >debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael128-cbc,rijndael192-cbc,rijndael256-cbc,rijndael-cbc@lysator.liu.se >debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael128-cbc,rijndael192-cbc,rijndael256-cbc,rijndael-cbc@lysator.liu.se >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: none,zlib >debug2: kex_parse_kexinit: none,zlib >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: first_kex_follows 0 >debug2: kex_parse_kexinit: reserved 0 >debug2: kex_parse_kexinit: gss-group1-sha1-Se3H81ismmOC3OE+FwYCiQ==,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 >debug2: kex_parse_kexinit: ssh-rsa,ssh-dss,null >debug2: kex_parse_kexinit: arcfour >debug2: kex_parse_kexinit: arcfour >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: none >debug2: kex_parse_kexinit: none >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: first_kex_follows 0 >debug2: kex_parse_kexinit: reserved 0 >debug2: mac_init: found hmac-md5 >debug1: kex: client->server arcfour hmac-md5 none >debug2: mac_init: found hmac-md5 >debug1: kex: server->client arcfour hmac-md5 none >debug1: Using -01 GSSAPI keyex draft >debug1: Wait SSH2_MSG_GSSAPI_INIT >debug1: Received some client credentials >debug1: gss_complete >debug1: dh_gen_key: priv key bits set: 130/256 >debug1: bits set: 503/1024 >debug1: bits set: 496/1024 >debug1: kex_derive_keys >debug1: newkeys: mode 1 >debug1: SSH2_MSG_NEWKEYS sent >debug1: waiting for SSH2_MSG_NEWKEYS >debug1: newkeys: mode 0 >debug1: SSH2_MSG_NEWKEYS received >debug1: KEX done >debug1: userauth-request for user joebob service ssh-connection method none >debug1: attempt 0 failures 0 >debug2: input_userauth_request: setting up authctxt for joebob >debug2: input_userauth_request: try method none >Failed none for joebob from 10.10.10.98 port 51959 ssh2 >debug1: userauth-request for user joebob service ssh-connection method external-keyx >debug1: attempt 1 failures 1 >debug2: input_userauth_request: try method external-keyx >debug1: temporarily_use_uid: 12345/14 (e=0) >debug1: trying public key file /home/joebob/.ssh/authorized_keys >debug1: restore_uid >debug1: temporarily_use_uid: 12345/14 (e=0) >debug1: trying public key file /home/joebob/.ssh/authorized_keys2 >debug3: key_read: type mismatch >debug2: user_key_allowed: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAIEAu/pTzNhiGYsBhSQR5VRmzVmyWtB1ZBBo0NLADYdQJeHirPXN/EBw3Jllctj1VZ0NSV16SeO7th2GF1Cx3EaeoNpCi19QqwGdNLJlzM51RK7a2rdfM6b8NdP9pCdgvByp+83/Lr9bgz7tfJmlO8pkd3/ewlQ654qpfeGAm6fgdmc= joebob@joehost >' >debug2: key_type_from_name: unknown key type 'AAAAB3NzaC1yc2EAAAABIwAAAIEAu/pTzNhiGYsBhSQR5VRmzVmyWtB1ZBBo0NLADYdQJeHirPXN/EBw3Jllctj1VZ0NSV16SeO7th2GF1Cx3EaeoNpCi19QqwGdNLJlzM51RK7a2rdfM6b8NdP9pCdgvByp+83/Lr9bgz7tfJmlO8pkd3/ewlQ654qpfeGAm6fgdmc=' >debug3: key_read: no key found >debug2: user_key_allowed: advance: 'AAAAB3NzaC1yc2EAAAABIwAAAIEAu/pTzNhiGYsBhSQR5VRmzVmyWtB1ZBBo0NLADYdQJeHirPXN/EBw3Jllctj1VZ0NSV16SeO7th2GF1Cx3EaeoNpCi19QqwGdNLJlzM51RK7a2rdfM6b8NdP9pCdgvByp+83/Lr9bgz7tfJmlO8pkd3/ewlQ654qpfeGAm6fgdmc= joebob@joehost >' >debug3: key_read: type mismatch >debug2: user_key_allowed: check options: 'ssh-dss AAAAB3NzaC1kc3MAAACBAOYyKKCvMbmngaQ6dJxuRwyNX0ShDPNVrT+hlp0kzFEN9SO24nRtNmwvK/Ausgno3jkIpMc3PtxyKOd9apCYUQxCJ0aRLF+TCyt5jhlP5BZQNUPit2ixyk0HN7xxZyGSHdyZNDvLeBgIfBXlpsoU4DSfmjZr8dCxab2e5gqhHU1RAAAAFQDwBweijDseGJT//qjmFnu2Cc9C+QAAAIBWE1i+RcDEVrnnlRW8RVmYqOzOk3Rs1r9KjRImgILNpOcycJ+ErsA1l3Ign5YdhF+8tdb+QlffFp4masIPWuzjdvrYIxg1WJFbt3hqM50GSOiyhQ82vcYjwZov/it9yjtyzZI8iXbWaqE3C1bERb6M32rULEaFQyWjpuu6JtJ+eQAAAIBtPKW7N6RaupI3zaFAfn2GglE0KrHayG3TvJncQvLk9hDUgeVJJyomXLqU+yG999qeEKxqXTCwjX/xsojHk/6B1PKaxMOIwiSzm9+mXPCEGnwBfIolB7DYEFjCK3IEeEwPYKu34lYk+L6MhPYlY8BrV1gmZCcD2kyRiQhpJoJm6g== joebob@joehost >' >debug2: key_type_from_name: unknown key type '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' >debug3: key_read: no key found >debug2: user_key_allowed: advance: 'AAAAB3NzaC1kc3MAAACBAOYyKKCvMbmngaQ6dJxuRwyNX0ShDPNVrT+hlp0kzFEN9SO24nRtNmwvK/Ausgno3jkIpMc3PtxyKOd9apCYUQxCJ0aRLF+TCyt5jhlP5BZQNUPit2ixyk0HN7xxZyGSHdyZNDvLeBgIfBXlpsoU4DSfmjZr8dCxab2e5gqhHU1RAAAAFQDwBweijDseGJT//qjmFnu2Cc9C+QAAAIBWE1i+RcDEVrnnlRW8RVmYqOzOk3Rs1r9KjRImgILNpOcycJ+ErsA1l3Ign5YdhF+8tdb+QlffFp4masIPWuzjdvrYIxg1WJFbt3hqM50GSOiyhQ82vcYjwZov/it9yjtyzZI8iXbWaqE3C1bERb6M32rULEaFQyWjpuu6JtJ+eQAAAIBtPKW7N6RaupI3zaFAfn2GglE0KrHayG3TvJncQvLk9hDUgeVJJyomXLqU+yG999qeEKxqXTCwjX/xsojHk/6B1PKaxMOIwiSzm9+mXPCEGnwBfIolB7DYEFjCK3IEeEwPYKu34lYk+L6MhPYlY8BrV1gmZCcD2kyRiQhpJoJm6g== joebob@joehost >' >debug1: restore_uid >debug2: key not found >Authorized to joebob, krb5 principal joebob@FOOBAR.COM (krb5_kuserok) >Accepted external-keyx for joebob from 10.10.10.98 port 51959 ssh2 >debug1: Entering interactive session for SSH2. >debug1: fd 9 setting O_NONBLOCK >debug1: fd 11 setting O_NONBLOCK >debug1: server_init_dispatch_20 >debug1: server_input_channel_open: ctype session rchan 0 win 65536 max 32768 >debug1: input_session_request >debug1: channel 0: new [server-session] >debug1: session_new: init >debug1: session_new: session 0 >debug1: session_open: channel 0 >debug1: session_open: session 0: link with channel 0 >debug1: server_input_channel_open: confirm session >debug2: callback start >debug1: session_by_channel: session 0 channel 0 >debug1: session_input_channel_req: session 0 channel 0 request exec reply 0 >debug1: temporarily_use_uid: 12345/14 (e=0) >debug1: restore_uid >debug1: fd 13 setting O_NONBLOCK >debug2: fd 13 is O_NONBLOCK >debug1: fd 15 setting O_NONBLOCK >debug2: callback done >debug2: channel 0: read 61 from efd 15 >debug2: channel 0: rwin 65536 elen 61 euse 1 >debug2: channel 0: sent ext data 61 >debug2: channel 0: read 15 from efd 15 >debug2: channel 0: rwin 65475 elen 15 euse 1 >debug2: channel 0: sent ext data 15 >debug2: channel 0: read 156 from efd 15 >debug2: channel 0: rwin 65460 elen 156 euse 1 >debug2: channel 0: sent ext data 156 >debug2: channel 0: read 114 from efd 15 >debug2: channel 0: rwin 65304 elen 114 euse 1 >debug2: channel 0: sent ext data 114 >debug1: channel 0: rcvd eof >debug1: channel 0: output open -> drain >debug1: channel 0: obuf empty >debug1: channel 0: output drain -> closed >debug1: channel 0: close_write >debug2: channel 0: read 0 from efd 15 >debug2: channel 0: closing read-efd 15 >debug1: channel 0: read<=0 rfd 13 len 0 >debug1: channel 0: read failed >debug1: channel 0: input open -> drain >debug1: channel 0: close_read >debug1: channel 0: ibuf empty >debug1: channel 0: input drain -> closed >debug1: channel 0: send eof >debug1: Received SIGCHLD. >debug1: session_by_pid: pid 2591 >debug1: session_exit_message: session 0 channel 0 pid 2591 >debug1: session_exit_message: release channel 0 >debug1: session_close: session 0 pid 2591 >debug1: channel 0: send close >debug3: channel 0: will not send data after close >debug2: notify_done: reading >debug1: channel 0: rcvd close >debug3: channel 0: will not send data after close >debug1: channel 0: is dead >debug1: channel 0: garbage collecting >debug1: channel_free: channel 0: server-session, nchannels 1 >debug3: channel_free: status: The following connections are open: > #0 server-session (t4 r0 i8/0 o128/0 fd 13/13) > >debug3: channel_close_fds: channel 0: r 13 w 13 e -1 > > >******************************************************************************** >GOODCLIENT -v -v -v: >client% /usr/bin/scp -P 6666 /tmp/core server:/tmp/foon >OpenSSH_2.9p2, SSH protocols 1.5/2.0, OpenSSL 0x0090600f >debug1: Reading configuration data /opt/PERssh/etc/ssh_config >debug1: Applying options for * >debug3: cipher ok: arcfour [arcfour] >debug3: ciphers ok: [arcfour] >debug1: Seeding random number generator >debug1: Rhosts Authentication disabled, originating port will not be trusted. >debug1: restore_uid >debug1: ssh_connect: getuid 12345 geteuid 0 anon 1 >debug1: Connecting to server [151.191.4.18] port 6666. >debug1: temporarily_use_uid: 12345/14 (e=0) >debug1: restore_uid >debug1: temporarily_use_uid: 12345/14 (e=0) >debug1: restore_uid >debug1: Connection established. >debug1: identity file /home/joebob/.ssh/identity type -1 >debug3: No RSA1 key file /home/joebob/.ssh/id_dsa. >debug2: key_type_from_name: unknown key type '-----BEGIN' >debug3: key_read: no key found >debug3: key_read: no space >debug3: key_read: no space >debug3: key_read: no space >debug3: key_read: no space >debug3: key_read: no space >debug3: key_read: no space >debug3: key_read: no space >debug3: key_read: no space >debug3: key_read: no space >debug3: key_read: no space >debug2: key_type_from_name: unknown key type '-----END' >debug3: key_read: no key found >debug3: key_read: here -- ret->type == 2 >debug3: key_read: reading uuencoded key >debug1: identity file /home/joebob/.ssh/id_dsa type 2 >debug1: identity file /home/joebob/.ssh/id_rsa1 type -1 >debug3: No RSA1 key file /home/joebob/.ssh/id_rsa2. >debug2: key_type_from_name: unknown key type '-----BEGIN' >debug3: key_read: no key found >debug3: key_read: no space >debug3: key_read: no space >debug3: key_read: no space >debug3: key_read: no space >debug3: key_read: no space >debug3: key_read: no space >debug3: key_read: no space >debug3: key_read: no space >debug3: key_read: no space >debug3: key_read: no space >debug3: key_read: no space >debug3: key_read: no space >debug3: key_read: no space >debug2: key_type_from_name: unknown key type '-----END' >debug3: key_read: no key found >debug3: key_read: here -- ret->type == 1 >debug3: key_read: reading uuencoded key >debug1: identity file /home/joebob/.ssh/id_rsa2 type 1 >debug1: Remote protocol version 1.99, remote software version OpenSSH_3.0.2p1_gsskeyex02 >debug1: match: OpenSSH_3.0.2p1_gsskeyex02 pat ^OpenSSH >Enabling compatibility mode for protocol 2.0 >debug1: Local version string SSH-2.0-OpenSSH_2.9p2 >SELECT: READ FD(6) >SELECT: READ FD(6) >debug1: SSH2_MSG_KEXINIT sent >SELECT: READ FD(5) >debug1: SSH2_MSG_KEXINIT received >debug2: kex_parse_kexinit: gss-group1-sha1-Se3H81ismmOC3OE+FwYCiQ==,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 >debug2: kex_parse_kexinit: ssh-rsa,ssh-dss,null >debug2: kex_parse_kexinit: arcfour >debug2: kex_parse_kexinit: arcfour >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: none >debug2: kex_parse_kexinit: none >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: first_kex_follows 0 >debug2: kex_parse_kexinit: reserved 0 >debug2: kex_parse_kexinit: gss-group1-sha1-Se3H81ismmOC3OE+FwYCiQ==,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 >debug2: kex_parse_kexinit: ssh-rsa,ssh-dss >debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael128-cbc,rijndael192-cbc,rijndael256-cbc,rijndael-cbc@lysator.liu.se >debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael128-cbc,rijndael192-cbc,rijndael256-cbc,rijndael-cbc@lysator.liu.se >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: none,zlib >debug2: kex_parse_kexinit: none,zlib >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: first_kex_follows 0 >debug2: kex_parse_kexinit: reserved 0 >debug2: mac_init: found hmac-md5 >debug1: kex: server->client arcfour hmac-md5 none >debug2: mac_init: found hmac-md5 >debug1: kex: client->server arcfour hmac-md5 none >debug1: dh_gen_key: priv key bits set: 116/256 >debug1: bits set: 518/1024 >debug1: Calling gss_init_sec_context >debug1: Delegating credentials >SELECT: READ FD(6) >SELECT: READ FD(6) >SELECT: READ FD(5) >debug1: Received GSSAPI_COMPLETE >debug1: Calling gss_init_sec_context >debug1: Delegating credentials >debug1: bits set: 491/1024 >debug1: kex_derive_keys >debug1: newkeys: mode 1 >debug1: SSH2_MSG_NEWKEYS sent >debug1: waiting for SSH2_MSG_NEWKEYS >SELECT: READ FD(5) >debug1: newkeys: mode 0 >debug1: SSH2_MSG_NEWKEYS received >debug1: done: ssh_kex2. >debug1: send SSH2_MSG_SERVICE_REQUEST >SELECT: READ FD(5) >debug1: service_accept: ssh-userauth >debug1: got SSH2_MSG_SERVICE_ACCEPT >SELECT: READ FD(5) >debug1: authentications that can continue: external-keyx,gssapi,publickey,password >debug3: start over, passed a different list external-keyx,gssapi,publickey,password >debug3: preferred external-keyx,gssapi,publickey,password,keyboard-interactive >debug3: authmethod_lookup external-keyx >debug3: remaining preferred: gssapi,publickey,password,keyboard-interactive >debug3: authmethod_is_enabled external-keyx >debug1: next auth method to try is external-keyx >debug2: userauth_external >debug2: we sent a external-keyx packet, wait for reply >SELECT: READ FD(5) >debug1: ssh-userauth2 successful: method external-keyx >debug1: fd 6 setting O_NONBLOCK >debug1: fd 8 setting O_NONBLOCK >debug1: channel 0: new [client-session] >debug1: channel_new: 0 >debug1: send channel open 0 >debug1: Entering interactive session. >SELECT: READ FD(5) >SELECT: WRITE FD(5) >SELECT: READ FD(5) >debug2: callback start >debug1: client_init id 0 arg 0 >debug1: Sending command: scp -t /tmp/foon >debug2: callback done >debug1: channel 0: open confirm rwindow 0 rmax 16384 >SELECT: READ FD(5) >SELECT: WRITE FD(5) >SELECT: READ FD(5) >debug2: channel 0: rcvd adjust 32768 >SELECT: READ FD(5) >SELECT: READ FD(6) >debug2: channel 0: rcvd ext data 340 >SELECT: READ FD(5) >SELECT: READ FD(6) >SELECT: WRITE FD(8) >SELECT: WRITE FD(9) >debug1: Setting KRB5CCNAME to FILE:/tmp/krb5cc_12345 >Environment: > KRB5CCNAME=FILE:/tmp/krb5cc_12345 > USER=joebob > LOGNAME=joebob > HOME=/home/joebob > PATH=/usr/bin:/bin:/usr/sbin:/sbin:/opt/PERssh/bin > MAIL=/var/mail//joebob > SHELL=/bin/csh > TZ=US/Eastern > SSH_CLIENT=10.10.10.98 52240 6666 >debug3: channel_close_fds: channel 0: r -1 w -1 e -1 >debug2: channel 0: written 340 to efd 9 >SELECT: READ FD(5) >SELECT: READ FD(6) >SELECT: READ FD(5) >SELECT: READ FD(6) >SELECT: WRITE FD(5) >SELECT: READ FD(5) >SELECT: READ FD(6) >SELECT: READ FD(5) >SELECT: READ FD(6) >SELECT: WRITE FD(8) >SELECT: READ FD(5) >SELECT: READ FD(6) >core 0% | | 0 --:-- ETASELECT: READ FD(5) >core 100% |*****************************| 2 00:00 >SELECT: READ FD(6) >SELECT: WRITE FD(5) >SELECT: READ FD(5) >SELECT: READ FD(6) >SELECT: WRITE FD(5) >SELECT: READ FD(5) >SELECT: READ FD(6) >SELECT: READ FD(5) >SELECT: READ FD(6) >SELECT: WRITE FD(8) >SELECT: READ FD(5) >SELECT: READ FD(6) >debug1: channel 0: read<=0 rfd 6 len 0 >debug1: channel 0: read failed >debug1: channel 0: input open -> drain >debug1: channel 0: close_read >debug1: channel 0: input: no drain shortcut >debug1: channel 0: ibuf empty >debug1: channel 0: input drain -> closed >debug1: channel 0: send eof >SELECT: READ FD(5) >SELECT: WRITE FD(5) >SELECT: READ FD(5) >joebob@somehost[49]% debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 >SELECT: READ FD(5) >debug1: channel 0: rcvd eof >debug1: channel 0: output open -> drain >debug1: channel 0: rcvd close >debug2: channel 0: no data after CLOSE >debug1: channel 0: obuf empty >debug1: channel 0: output drain -> closed >debug1: channel 0: close_write >debug1: channel 0: send close >debug1: channel 0: is dead >debug1: channel_free: channel 0: status: The following connections are open: > #0 client-session (t4 r0 i8/0 o128/0 fd -1/-1) > >debug1: channel_free: channel 0: dettaching channel user >SELECT: READ FD(5) >SELECT: WRITE FD(5) >debug1: Transferred: stdin 0, stdout 0, stderr 0 bytes in 0.9 seconds >debug1: Bytes per second: stdin 0.0, stdout 0.0, stderr 0.0 >debug1: Exit status 0 > > >******************************************************************************** >GOODSERVER -d -d -d: >server# /opt/PERssh/sbin/sshd -p 6666 -d -d -d >debug1: Seeding random number generator >debug1: sshd version OpenSSH_3.0.2p1_gsskeyex02 >debug1: private host key: #0 type 0 RSA1 >debug3: Not a RSA1 key file /opt/PERssh/etc/ssh_host_rsa_key. >debug1: read PEM private key done: type RSA >debug1: private host key: #1 type 1 RSA >debug3: Not a RSA1 key file /opt/PERssh/etc/ssh_host_dsa_key. >debug1: read PEM private key done: type DSA >debug1: private host key: #2 type 2 DSA >debug1: Bind to port 6666 on 0.0.0.0. >Server listening on 0.0.0.0 port 6666. >Generating 768 bit RSA key. >RSA key generation complete. >debug1: Server will not fork when running in debugging mode. >Connection from 10.10.10.98 port 52240 >debug1: Client protocol version 2.0; client software version OpenSSH_2.9p2 >debug1: match: OpenSSH_2.9p2 pat ^OpenSSH_2\.9 >Enabling compatibility mode for protocol 2.0 >debug1: Local version string SSH-1.99-OpenSSH_3.0.2p1_gsskeyex02 >debug1: Rhosts Authentication disabled, originating port 52240 not trusted. >debug1: list_hostkey_types: ssh-rsa,ssh-dss >debug1: SSH2_MSG_KEXINIT sent >debug1: SSH2_MSG_KEXINIT received >debug2: kex_parse_kexinit: gss-group1-sha1-Se3H81ismmOC3OE+FwYCiQ==,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 >debug2: kex_parse_kexinit: ssh-rsa,ssh-dss >debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael128-cbc,rijndael192-cbc,rijndael256-cbc,rijndael-cbc@lysator.liu.se >debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael128-cbc,rijndael192-cbc,rijndael256-cbc,rijndael-cbc@lysator.liu.se >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: none,zlib >debug2: kex_parse_kexinit: none,zlib >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: first_kex_follows 0 >debug2: kex_parse_kexinit: reserved 0 >debug2: kex_parse_kexinit: gss-group1-sha1-Se3H81ismmOC3OE+FwYCiQ==,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 >debug2: kex_parse_kexinit: ssh-rsa,ssh-dss,null >debug2: kex_parse_kexinit: arcfour >debug2: kex_parse_kexinit: arcfour >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: none >debug2: kex_parse_kexinit: none >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: first_kex_follows 0 >debug2: kex_parse_kexinit: reserved 0 >debug2: mac_init: found hmac-md5 >debug1: kex: client->server arcfour hmac-md5 none >debug2: mac_init: found hmac-md5 >debug1: kex: server->client arcfour hmac-md5 none >debug1: Using -01 GSSAPI keyex draft >debug1: Wait SSH2_MSG_GSSAPI_INIT >debug1: Received some client credentials >debug1: gss_complete >debug1: dh_gen_key: priv key bits set: 126/256 >debug1: bits set: 491/1024 >debug1: bits set: 518/1024 >debug1: kex_derive_keys >debug1: newkeys: mode 1 >debug1: SSH2_MSG_NEWKEYS sent >debug1: waiting for SSH2_MSG_NEWKEYS >debug1: newkeys: mode 0 >debug1: SSH2_MSG_NEWKEYS received >debug1: KEX done >debug1: userauth-request for user joebob service ssh-connection method none >debug1: attempt 0 failures 0 >debug2: input_userauth_request: setting up authctxt for joebob >debug2: input_userauth_request: try method none >Failed none for joebob from 10.10.10.98 port 52240 ssh2 >debug1: userauth-request for user joebob service ssh-connection method external-keyx >debug1: attempt 1 failures 1 >debug2: input_userauth_request: try method external-keyx >debug1: temporarily_use_uid: 12345/14 (e=0) >debug1: trying public key file /home/joebob/.ssh/authorized_keys >debug1: restore_uid >debug1: temporarily_use_uid: 12345/14 (e=0) >debug1: trying public key file /home/joebob/.ssh/authorized_keys2 >debug3: secure_filename: checking '/home/joebob/.ssh' >debug3: secure_filename: checking '/home/joebob' >debug3: secure_filename: terminating check at '/home/joebob' >debug3: key_read: type mismatch >debug2: user_key_allowed: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAIEAu/pTzNhiGYsBhSQR5VRmzVmyWtB1ZBBo0NLADYdQJeHirPXN/EBw3Jllctj1VZ0NSV16SeO7th2GF1Cx3EaeoNpCi19QqwGdNLJlzM51RK7a2rdfM6b8NdP9pCdgvByp+83/Lr9bgz7tfJmlO8pkd3/ewlQ654qpfeGAm6fgdmc= joebob@joehost >' >debug2: key_type_from_name: unknown key type 'AAAAB3NzaC1yc2EAAAABIwAAAIEAu/pTzNhiGYsBhSQR5VRmzVmyWtB1ZBBo0NLADYdQJeHirPXN/EBw3Jllctj1VZ0NSV16SeO7th2GF1Cx3EaeoNpCi19QqwGdNLJlzM51RK7a2rdfM6b8NdP9pCdgvByp+83/Lr9bgz7tfJmlO8pkd3/ewlQ654qpfeGAm6fgdmc=' >debug3: key_read: no key found >debug2: user_key_allowed: advance: 'AAAAB3NzaC1yc2EAAAABIwAAAIEAu/pTzNhiGYsBhSQR5VRmzVmyWtB1ZBBo0NLADYdQJeHirPXN/EBw3Jllctj1VZ0NSV16SeO7th2GF1Cx3EaeoNpCi19QqwGdNLJlzM51RK7a2rdfM6b8NdP9pCdgvByp+83/Lr9bgz7tfJmlO8pkd3/ewlQ654qpfeGAm6fgdmc= joebob@joehost >' >debug3: key_read: type mismatch >debug2: user_key_allowed: check options: 'ssh-dss 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 joebob@joehost >' >debug2: key_type_from_name: unknown key type 'AAAAB3NzaC1kc3MAAACBAOYyKKCvMbmngaQ6dJxuRwyNX0ShDPNVrT+hlp0kzFEN9SO24nRtNmwvK/Ausgno3jkIpMc3PtxyKOd9apCYUQxCJ0aRLF+TCyt5jhlP5BZQNUPit2ixyk0HN7xxZyGSHdyZNDvLeBgIfBXlpsoU4DSfmjZr8dCxab2e5gqhHU1RAAAAFQDwBweijDseGJT//qjmFnu2Cc9C+QAAAIBWE1i+RcDEVrnnlRW8RVmYqOzOk3Rs1r9KjRImgILNpOcycJ+ErsA1l3Ign5YdhF+8tdb+QlffFp4masIPWuzjdvrYIxg1WJFbt3hqM50GSOiyhQ82vcYjwZov/it9yjtyzZI8iXbWaqE3C1bERb6M32rULEaFQyWjpuu6JtJ+eQAAAIBtPKW7N6RaupI3zaFAfn2GglE0KrHayG3TvJncQvLk9hDUgeVJJyomXLqU+yG999qeEKxqXTCwjX/xsojHk/6B1PKaxMOIwiSzm9+mXPCEGnwBfIolB7DYEFjCK3IEeEwPYKu34lYk+L6MhPYlY8BrV1gmZCcD2kyRiQhpJoJm6g==' >debug3: key_read: no key found >debug2: user_key_allowed: advance: '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 joebob@joehost >' >debug1: restore_uid >debug2: key not found >Authorized to joebob, krb5 principal joebob@FOOBAR.COM (krb5_kuserok) >Accepted external-keyx for joebob from 10.10.10.98 port 52240 ssh2 >debug1: Entering interactive session for SSH2. >debug1: fd 9 setting O_NONBLOCK >debug1: fd 11 setting O_NONBLOCK >debug1: server_init_dispatch_20 >debug1: server_input_channel_open: ctype session rchan 0 win 65536 max 32768 >debug1: input_session_request >debug1: channel 0: new [server-session] >debug1: session_new: init >debug1: session_new: session 0 >debug1: session_open: channel 0 >debug1: session_open: session 0: link with channel 0 >debug1: server_input_channel_open: confirm session >debug2: callback start >debug1: session_by_channel: session 0 channel 0 >debug1: session_input_channel_req: session 0 channel 0 request exec reply 0 >debug1: temporarily_use_uid: 12345/14 (e=0) >debug1: restore_uid >debug1: fd 13 setting O_NONBLOCK >debug2: fd 13 is O_NONBLOCK >debug1: fd 15 setting O_NONBLOCK >debug2: callback done >debug2: channel 0: read 340 from efd 15 >debug2: channel 0: rwin 65536 elen 340 euse 1 >debug2: channel 0: sent ext data 340 >debug1: channel 0: rcvd eof >debug1: channel 0: output open -> drain >debug1: channel 0: obuf empty >debug1: channel 0: output drain -> closed >debug1: channel 0: close_write >debug1: Received SIGCHLD. >debug1: session_by_pid: pid 15931 >debug1: session_exit_message: session 0 channel 0 pid 15931 >debug1: session_exit_message: release channel 0 >debug1: session_close: session 0 pid 15931 >debug2: notify_done: reading >debug1: channel 0: read<=0 rfd 13 len 0 >debug1: channel 0: read failed >debug1: channel 0: input open -> drain >debug1: channel 0: close_read >debug2: channel 0: read 0 from efd 15 >debug2: channel 0: closing read-efd 15 >debug1: channel 0: ibuf empty >debug1: channel 0: input drain -> closed >debug1: channel 0: send eof >debug1: channel 0: send close >debug3: channel 0: will not send data after close >debug1: channel 0: rcvd close >debug3: channel 0: will not send data after close >debug1: channel 0: is dead >debug1: channel 0: garbage collecting >debug1: channel_free: channel 0: server-session, nchannels 1 >debug3: channel_free: status: The following connections are open: > #0 server-session (t4 r0 i8/0 o128/0 fd 13/13) > >debug3: channel_close_fds: channel 0: r 13 w 13 e -1 >Connection closed by remote host. >debug1: removing gssapi cred file"/tmp/krb5cc_12345" >debug1: krb5_cleanup_proc called >Closing connection to 10.10.10.98 > >******************************************************************************** >GOOD-BAD-CLIENT DIFF: >11c11 >< debug1: Connecting to server [151.191.4.18] port 6666. >--- >> debug1: Connecting to server [10.10.10.43] port 6666. >63d62 >< SELECT: READ FD(6) >95,96c94,95 >< debug1: dh_gen_key: priv key bits set: 116/256 >< debug1: bits set: 518/1024 >--- >> debug1: dh_gen_key: priv key bits set: 127/256 >> debug1: bits set: 496/1024 >105c104 >< debug1: bits set: 491/1024 >--- >> debug1: bits set: 503/1024 >150c149,159 >< debug2: channel 0: rcvd ext data 340 >--- >> debug2: channel 0: rcvd ext data 61 >> SELECT: READ FD(5) >> SELECT: READ FD(6) >> SELECT: WRITE FD(9) >> debug1: Setting KRB5CCNAME to FILE:/tmp/krb5cc_12345_Jy2387 >> debug2: channel 0: written 61 to efd 9 >> SELECT: READ FD(5) >> SELECT: READ FD(6) >> debug2: channel 0: rcvd ext data 15 >> debug2: channel 0: rcvd ext data 156 >> debug2: channel 0: rcvd ext data 114 >155d163 >< debug1: Setting KRB5CCNAME to FILE:/tmp/krb5cc_12345 >157c165 >< KRB5CCNAME=FILE:/tmp/krb5cc_12345 >--- >> KRB5CCNAME=FILE:/tmp/krb5cc_12345_Jy2387 >164,165c172,173 >< TZ=US/Eastern >< SSH_CLIENT=10.10.10.98 52240 6666 >--- >> TZ=GB >> SSH_CLIENT=10.10.10.98 51959 6666 >167c175 >< debug2: channel 0: written 340 to efd 9 >--- >> debug2: channel 0: written 285 to efd 9 >205,206d212 >< joebob@somehost[49]% debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 >< SELECT: READ FD(5) >209,210d214 >< debug1: channel 0: rcvd close >< debug2: channel 0: no data after CLOSE >214a219,225 >> SELECT: READ FD(5) >> SELECT: WRITE FD(5) >> debug2: channel 0: no data after CLOSE >> SELECT: READ FD(5) >> debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 >> debug1: channel 0: rcvd close >> debug2: channel 0: no data after CLOSE >221,224d231 >< SELECT: WRITE FD(5) >< debug1: Transferred: stdin 0, stdout 0, stderr 0 bytes in 0.9 seconds >< debug1: Bytes per second: stdin 0.0, stdout 0.0, stderr 0.0 >< debug1: Exit status 0 >225a233,239 >> ( >> After ^C'ing the sshd: >> Connection to somehost closed by remote host. >> debug1: Transferred: stdin 0, stdout 0, stderr 49 bytes in 691.1 seconds >> debug1: Bytes per second: stdin 0.0, stdout 0.0, stderr 0.1 >> debug1: Exit status 0 >> ) > >******************************************************************************** >GOOD-BAD-SERVER DIFF: >16c16 >< Connection from 10.10.10.98 port 52240 >--- >> Connection from 10.10.10.98 port 51959 >21c21 >< debug1: Rhosts Authentication disabled, originating port 52240 not trusted. >--- >> debug1: Rhosts Authentication disabled, originating port 51959 not trusted. >57,59c57,59 >< debug1: dh_gen_key: priv key bits set: 126/256 >< debug1: bits set: 491/1024 >< debug1: bits set: 518/1024 >--- >> debug1: dh_gen_key: priv key bits set: 130/256 >> debug1: bits set: 503/1024 >> debug1: bits set: 496/1024 >71c71 >< Failed none for joebob from 10.10.10.98 port 52240 ssh2 >--- >> Failed none for joebob from 10.10.10.98 port 51959 ssh2 >80,82d79 >< debug3: secure_filename: checking '/home/joebob/.ssh' >< debug3: secure_filename: checking '/home/joebob' >< debug3: secure_filename: terminating check at '/home/joebob' >100c97 >< Accepted external-keyx for joebob from 10.10.10.98 port 52240 ssh2 >--- >> Accepted external-keyx for joebob from 10.10.10.98 port 51959 ssh2 >122,124c119,130 >< debug2: channel 0: read 340 from efd 15 >< debug2: channel 0: rwin 65536 elen 340 euse 1 >< debug2: channel 0: sent ext data 340 >--- >> debug2: channel 0: read 61 from efd 15 >> debug2: channel 0: rwin 65536 elen 61 euse 1 >> debug2: channel 0: sent ext data 61 >> debug2: channel 0: read 15 from efd 15 >> debug2: channel 0: rwin 65475 elen 15 euse 1 >> debug2: channel 0: sent ext data 15 >> debug2: channel 0: read 156 from efd 15 >> debug2: channel 0: rwin 65460 elen 156 euse 1 >> debug2: channel 0: sent ext data 156 >> debug2: channel 0: read 114 from efd 15 >> debug2: channel 0: rwin 65304 elen 114 euse 1 >> debug2: channel 0: sent ext data 114 >130,135c136,137 >< debug1: Received SIGCHLD. >< debug1: session_by_pid: pid 15931 >< debug1: session_exit_message: session 0 channel 0 pid 15931 >< debug1: session_exit_message: release channel 0 >< debug1: session_close: session 0 pid 15931 >< debug2: notify_done: reading >--- >> debug2: channel 0: read 0 from efd 15 >> debug2: channel 0: closing read-efd 15 >140,141d141 >< debug2: channel 0: read 0 from efd 15 >< debug2: channel 0: closing read-efd 15 >144a145,149 >> debug1: Received SIGCHLD. >> debug1: session_by_pid: pid 2591 >> debug1: session_exit_message: session 0 channel 0 pid 2591 >> debug1: session_exit_message: release channel 0 >> debug1: session_close: session 0 pid 2591 >146a152 >> debug2: notify_done: reading >156,159c162 >< Connection closed by remote host. >< debug1: removing gssapi cred file"/tmp/krb5cc_12345" >< debug1: krb5_cleanup_proc called >< Closing connection to 10.10.10.98 >--- >> > >******************************************************************************** >SELECT-WRAPPER.C: >#include <dlfcn.h> >#include <sys/time.h> >#include <stdio.h> >#include <unistd.h> >#include <fcntl.h> > >static FILE *fd = NULL; > >int >select(nfds, readfds, writefds, errorfds, timeout) > int nfds; > fd_set *readfds, *writefds, *errorfds; > struct timeval *timeout; >{ > static int (*real)(int, fd_set *, fd_set *, fd_set *, struct timeval *); > int i; > char *e, *re; > > if (!fd) > fd = fopen("/dev/tty", "rb+"); > > if (real == NULL) > real = (int (*)(int, fd_set *, fd_set *, fd_set *, struct timeval *)) dlsym(RTLD_NEXT, "select"); > > if (real) { > if (readfds != NULL) > for (i = 0; i < nfds; i++) { > if (FD_ISSET(i, readfds)) > fprintf(fd, "SELECT: READ FD(%d)\n", i); > } > if (writefds != NULL) > for (i = 0; i < nfds; i++) { > if (FD_ISSET(i, writefds)) > fprintf(fd, "SELECT: WRITE FD(%d)\n", i); > } > if (errorfds != NULL) > for (i = 0; i < nfds; i++) { > if (FD_ISSET(i, errorfds)) > fprintf(fd, "SELECT: ERROR FD(%d)\n", i); > } > return (*real)(nfds, readfds, writefds, errorfds,timeout); > } > return 0; >} > > >******************************************************************************** >SSH WRAPPER: >#!/bin/ksh > > > >/usr/proc/bin/ptree $$ | grep '[p]6666' 2>&1 > /dev/null >[[ $? = 0 ]] || exec /opt/PERssh/bin/real/ssh "$@" > >LD_PRELOAD=selecttest.so >export LD_PRELOAD >exec /opt/PERssh/bin/real/ssh -v -v -v "$@" >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 160
: 40