[Bug 989] openssh-3.9p1 on Solaris 8 - multiplex.sh NOK

bugzilla-daemon at mindrot.org bugzilla-daemon at mindrot.org
Wed Mar 2 00:01:52 EST 2005


http://bugzilla.mindrot.org/show_bug.cgi?id=989

           Summary: openssh-3.9p1 on Solaris 8 - multiplex.sh NOK
           Product: Portable OpenSSH
           Version: 3.9p1
          Platform: UltraSparc
        OS/Version: Solaris
            Status: NEW
          Keywords: patch, help-wanted
          Severity: normal
          Priority: P5
         Component: Build system
        AssignedTo: openssh-bugs at mindrot.org
        ReportedBy: ervanborren-ext at airfrance.fr


Hi bugzilla.mindrot.org,

Thanks Darren Tucker  for your advice.

Need debug on Solaris 8 - openssh-3.9p1
see below

root at qvgdisy3 # make tests
...
run test multiplex.sh ...
test connection multiplexing: envpass
test connection multiplexing: transfer
Connecting to otherhost...
sftp> Fetching /bin/ls to /opt/SSH/openssh-3.9p1/regress/ls.copy
/bin/ls                                                                        
                 100%   18KB  18.4KB/s   00:00    
sftp> 
sh: scp: not found
scp: failed copy /bin/ls
cmp: cannot open /opt/SSH/openssh-3.9p1/regress/ls.copy
scp: corrupted copy of /bin/ls
test connection multiplexing: status 0
test connection multiplexing: status 1
test connection multiplexing: status 4
test connection multiplexing: status 5
test connection multiplexing: status 44
failed connection multiplexing
*** Error code 1
make: Fatal error: Command failed for target `t-exec'
Current working directory /opt/SSH/openssh-3.9p1/regress
*** Error code 1
make: Fatal error: Command failed for target `tests'
root at qvgdisy3 # 
-----------------------------------------------------------------------------
root at qvgdisy3 # ls -l multi*
-rw-r--r--   1 1000     1000        2330 Mar  1 11:09 multiplex.sh
root at qvgdisy3 # PATH=`pwd`/..:$PATH:. TEST_SHELL=/bin/sh TEST_SSH_TRACE=yes \
> TEST_SSH_SSHD_CONFOPTS=LogLevel=DEBUG3 sh -x test-exec.sh `pwd` \
multiplex.sh
> + [ ! -z  ] 
PORT=4242
+ [ -x /usr/ucb/whoami ] 
+ /usr/ucb/whoami 
USER=root
OBJ=/opt/SSH/openssh-3.9p1/regress
+ [ x/opt/SSH/openssh-3.9p1/regress = x ] 
+ [ ! -d /opt/SSH/openssh-3.9p1/regress ] 
SCRIPT=multiplex.sh
+ [ xmultiplex.sh = x ] 
+ [ ! -f multiplex.sh ] 
+ /bin/sh -n multiplex.sh 
+ true 
+ unset SSH_AUTH_SOCK 
SSH=ssh
SSHD=sshd
SSHAGENT=ssh-agent
SSHADD=ssh-add
SSHKEYGEN=ssh-keygen
SSHKEYSCAN=ssh-keyscan
SFTP=sftp
SFTPSERVER=/usr/libexec/openssh/sftp-server
SCP=scp
+ [ x != x ] 
+ [ x != x ] 
+ [ x != x ] 
+ [ x != x ] 
+ [ x != x ] 
+ [ x != x ] 
+ [ x != x ] 
+ [ x != x ] 
+ [ x != x ] 
+ which sshd 
SSHD=/opt/SSH/openssh-3.9p1/regress/../sshd
+ export SSH SSHD SSHAGENT SSHADD SSHKEYGEN SSHKEYSCAN SFTP SFTPSERVER SCP 
RESULT=0
PIDFILE=/opt/SSH/openssh-3.9p1/regress/pidfile
+ trap fatal 3 2 
+ cat 
        StrictModes             no
        Port                    4242
        ListenAddress           127.0.0.1
        #ListenAddress          ::1
        PidFile                 /opt/SSH/openssh-3.9p1/regress/pidfile
        AuthorizedKeysFile      /opt/SSH/openssh-3.9p1/regress/authorized_keys_%u
        LogLevel                QUIET
        AcceptEnv               _XXX_TEST_*
        AcceptEnv               _XXX_TEST
        Subsystem       sftp    /usr/libexec/openssh/sftp-server
+ [ ! -z LogLevel=DEBUG3 ] 
+ trace adding sshd_config option LogLevel=DEBUG3 
+ [ Xyes = Xyes ] 
+ echo adding sshd_config option LogLevel=DEBUG3 
adding sshd_config option LogLevel=DEBUG3
+ echo LogLevel=DEBUG3 
+ cp /opt/SSH/openssh-3.9p1/regress/sshd_config
/opt/SSH/openssh-3.9p1/regress/sshd_proxy 
+ echo StrictModes no 
+ cat 
Host *
        Hostname                127.0.0.1
        HostKeyAlias            localhost-with-alias
        Port                    4242
        User                    root
        GlobalKnownHostsFile    /opt/SSH/openssh-3.9p1/regress/known_hosts
        UserKnownHostsFile      /opt/SSH/openssh-3.9p1/regress/known_hosts
        RSAAuthentication       yes
        PubkeyAuthentication    yes
        ChallengeResponseAuthentication no
        HostbasedAuthentication no
        PasswordAuthentication  no
        RhostsRSAAuthentication no
        BatchMode               yes
        StrictHostKeyChecking   yes
+ [ ! -z  ] 
+ rm -f /opt/SSH/openssh-3.9p1/regress/known_hosts
/opt/SSH/openssh-3.9p1/regress/authorized_keys_root 
+ trace generate keys 
+ [ Xyes = Xyes ] 
+ echo generate keys 
generate keys
+ rm -f /opt/SSH/openssh-3.9p1/regress/rsa 
+ ssh-keygen -q -N  -t rsa -f /opt/SSH/openssh-3.9p1/regress/rsa 
+ echon localhost-with-alias,127.0.0.1,::1  
+ echo -n 
+ [ x-n = x ] 
+ echo \c 
+ [ x = x ] 
+ echo localhost-with-alias,127.0.0.1,::1 \c 
+ cat /opt/SSH/openssh-3.9p1/regress/rsa.pub 
+ cat /opt/SSH/openssh-3.9p1/regress/rsa.pub 
+ echo IdentityFile /opt/SSH/openssh-3.9p1/regress/rsa 
+ cp /opt/SSH/openssh-3.9p1/regress/rsa /opt/SSH/openssh-3.9p1/regress/host.rsa 
+ echo HostKey /opt/SSH/openssh-3.9p1/regress/host.rsa 
+ echo HostKey /opt/SSH/openssh-3.9p1/regress/rsa 
+ rm -f /opt/SSH/openssh-3.9p1/regress/rsa1 
+ ssh-keygen -q -N  -t rsa1 -f /opt/SSH/openssh-3.9p1/regress/rsa1 
+ echon localhost-with-alias,127.0.0.1,::1  
+ echo -n 
+ [ x-n = x ] 
+ echo \c 
+ [ x = x ] 
+ echo localhost-with-alias,127.0.0.1,::1 \c 
+ cat /opt/SSH/openssh-3.9p1/regress/rsa1.pub 
+ cat /opt/SSH/openssh-3.9p1/regress/rsa1.pub 
+ echo IdentityFile /opt/SSH/openssh-3.9p1/regress/rsa1 
+ cp /opt/SSH/openssh-3.9p1/regress/rsa1 /opt/SSH/openssh-3.9p1/regress/host.rsa1 
+ echo HostKey /opt/SSH/openssh-3.9p1/regress/host.rsa1 
+ echo HostKey /opt/SSH/openssh-3.9p1/regress/rsa1 
+ chmod 644 /opt/SSH/openssh-3.9p1/regress/authorized_keys_root 
+ cat /opt/SSH/openssh-3.9p1/regress/ssh_config 
+ echo proxycommand /opt/SSH/openssh-3.9p1/regress/../sshd -i -f
/opt/SSH/openssh-3.9p1/regress/sshd_proxy 
+ /opt/SSH/openssh-3.9p1/regress/../sshd -t -f
/opt/SSH/openssh-3.9p1/regress/sshd_proxy 
+ . multiplex.sh 
CTL=/opt/SSH/openssh-3.9p1/regress/ctl-sock
tid=connection multiplexing
DATA=/bin/ls
COPY=/opt/SSH/openssh-3.9p1/regress/ls.copy
+ start_sshd 
+ /opt/SSH/openssh-3.9p1/regress/../sshd -f
/opt/SSH/openssh-3.9p1/regress/sshd_config -t 
+ /opt/SSH/openssh-3.9p1/regress/../sshd -f
/opt/SSH/openssh-3.9p1/regress/sshd_config 
+ trace wait for sshd 
+ [ Xyes = Xyes ] 
+ echo wait for sshd 
wait for sshd
i=0
+ [ ! -f /opt/SSH/openssh-3.9p1/regress/pidfile -a 0 -lt 10 ] 
+ expr 0 + 1 
i=1
+ sleep 1 
+ [ ! -f /opt/SSH/openssh-3.9p1/regress/pidfile -a 1 -lt 10 ] 
+ test -f /opt/SSH/openssh-3.9p1/regress/pidfile 
+ trace start master, fork to background 
+ [ Xyes = Xyes ] 
+ echo start master, fork to background 
start master, fork to background
+ ssh -2 -MS/opt/SSH/openssh-3.9p1/regress/ctl-sock -F
/opt/SSH/openssh-3.9p1/regress/ssh_config -oSendEnv=_XXX_TEST -f somehost sleep 120 
+ verbose test connection multiplexing: envpass 
+ [ X != Xyes ] 
+ echo test connection multiplexing: envpass 
test connection multiplexing: envpass
+ trace env passing over multiplexed connection 
+ [ Xyes = Xyes ] 
+ echo env passing over multiplexed connection 
env passing over multiplexed connection
+ ssh -oSendEnv=_XXX_TEST -S/opt/SSH/openssh-3.9p1/regress/ctl-sock otherhost sh 
_XXX_TEST=blah
+ [ 0 -ne 0 ] 
+ verbose test connection multiplexing: transfer 
+ [ X != Xyes ] 
+ echo test connection multiplexing: transfer 
test connection multiplexing: transfer
+ rm -f /opt/SSH/openssh-3.9p1/regress/ls.copy 
+ trace ssh transfer over multiplexed connection and check result 
+ [ Xyes = Xyes ] 
+ echo ssh transfer over multiplexed connection and check result 
ssh transfer over multiplexed connection and check result
+ ssh -S/opt/SSH/openssh-3.9p1/regress/ctl-sock otherhost cat /bin/ls 
+ test -f /opt/SSH/openssh-3.9p1/regress/ls.copy 
+ cmp /bin/ls /opt/SSH/openssh-3.9p1/regress/ls.copy 
+ rm -f /opt/SSH/openssh-3.9p1/regress/ls.copy 
+ trace ssh transfer over multiplexed connection and check result 
+ [ Xyes = Xyes ] 
+ echo ssh transfer over multiplexed connection and check result 
ssh transfer over multiplexed connection and check result
+ ssh -S /opt/SSH/openssh-3.9p1/regress/ctl-sock otherhost cat /bin/ls 
+ test -f /opt/SSH/openssh-3.9p1/regress/ls.copy 
+ cmp /bin/ls /opt/SSH/openssh-3.9p1/regress/ls.copy 
+ rm -f /opt/SSH/openssh-3.9p1/regress/ls.copy 
+ trace sftp transfer over multiplexed connection and check result 
+ [ Xyes = Xyes ] 
+ echo sftp transfer over multiplexed connection and check result 
sftp transfer over multiplexed connection and check result
+ sftp + -S ssh -oControlPath=/opt/SSH/openssh-3.9p1/regress/ctl-sock otherhost 
echo get /bin/ls /opt/SSH/openssh-3.9p1/regress/ls.copy 
Connecting to otherhost...
Request failed on channel 1
Connection closed
+ test -f /opt/SSH/openssh-3.9p1/regress/ls.copy 
+ fail sftp: failed copy /bin/ls 
RESULT=1
+ echo sftp: failed copy /bin/ls 
sftp: failed copy /bin/ls
+ cmp /bin/ls /opt/SSH/openssh-3.9p1/regress/ls.copy 
cmp: cannot open /opt/SSH/openssh-3.9p1/regress/ls.copy
+ fail sftp: corrupted copy of /bin/ls 
RESULT=1
+ echo sftp: corrupted copy of /bin/ls 
sftp: corrupted copy of /bin/ls
+ rm -f /opt/SSH/openssh-3.9p1/regress/ls.copy 
+ trace scp transfer over multiplexed connection and check result 
+ [ Xyes = Xyes ] 
+ echo scp transfer over multiplexed connection and check result 
scp transfer over multiplexed connection and check result
+ scp -S ssh -oControlPath=/opt/SSH/openssh-3.9p1/regress/ctl-sock
otherhost:/bin/ls /opt/SSH/openssh-3.9p1/regress/ls.copy 
sh: scp: not found
+ test -f /opt/SSH/openssh-3.9p1/regress/ls.copy 
+ fail scp: failed copy /bin/ls 
RESULT=1
+ echo scp: failed copy /bin/ls 
scp: failed copy /bin/ls
+ cmp /bin/ls /opt/SSH/openssh-3.9p1/regress/ls.copy 
cmp: cannot open /opt/SSH/openssh-3.9p1/regress/ls.copy
+ fail scp: corrupted copy of /bin/ls 
RESULT=1
+ echo scp: corrupted copy of /bin/ls 
scp: corrupted copy of /bin/ls
+ rm -f /opt/SSH/openssh-3.9p1/regress/ls.copy 
+ trace exit status 0 over multiplexed connection 
+ [ Xyes = Xyes ] 
+ echo exit status 0 over multiplexed connection 
exit status 0 over multiplexed connection
+ verbose test connection multiplexing: status 0 
+ [ X != Xyes ] 
+ echo test connection multiplexing: status 0 
test connection multiplexing: status 0
+ ssh -S /opt/SSH/openssh-3.9p1/regress/ctl-sock otherhost exit 0 
r=0
+ [ 0 -ne 0 ] 
+ trace exit status 0 with early close over multiplexed connection 
+ [ Xyes = Xyes ] 
+ echo exit status 0 with early close over multiplexed connection 
exit status 0 with early close over multiplexed connection
+ ssh -S /opt/SSH/openssh-3.9p1/regress/ctl-sock -n otherhost exec sh -c 'sleep
2; exec > /dev/null 2>&1; sleep 3; exit 0' 
r=0
+ [ 0 -ne 0 ] 
+ trace exit status 1 over multiplexed connection 
+ [ Xyes = Xyes ] 
+ echo exit status 1 over multiplexed connection 
exit status 1 over multiplexed connection
+ verbose test connection multiplexing: status 1 
+ [ X != Xyes ] 
+ echo test connection multiplexing: status 1 
test connection multiplexing: status 1
+ ssh -S /opt/SSH/openssh-3.9p1/regress/ctl-sock otherhost exit 1 
r=1
+ [ 1 -ne 1 ] 
+ trace exit status 1 with early close over multiplexed connection 
+ [ Xyes = Xyes ] 
+ echo exit status 1 with early close over multiplexed connection 
exit status 1 with early close over multiplexed connection
+ ssh -S /opt/SSH/openssh-3.9p1/regress/ctl-sock -n otherhost exec sh -c 'sleep
2; exec > /dev/null 2>&1; sleep 3; exit 1' 
r=1
+ [ 1 -ne 1 ] 
+ trace exit status 4 over multiplexed connection 
+ [ Xyes = Xyes ] 
+ echo exit status 4 over multiplexed connection 
exit status 4 over multiplexed connection
+ verbose test connection multiplexing: status 4 
+ [ X != Xyes ] 
+ echo test connection multiplexing: status 4 
test connection multiplexing: status 4
+ ssh -S /opt/SSH/openssh-3.9p1/regress/ctl-sock otherhost exit 4 
r=4
+ [ 4 -ne 4 ] 
+ trace exit status 4 with early close over multiplexed connection 
+ [ Xyes = Xyes ] 
+ echo exit status 4 with early close over multiplexed connection 
exit status 4 with early close over multiplexed connection
+ ssh -S /opt/SSH/openssh-3.9p1/regress/ctl-sock -n otherhost exec sh -c 'sleep
2; exec > /dev/null 2>&1; sleep 3; exit 4' 
r=4
+ [ 4 -ne 4 ] 
+ trace exit status 5 over multiplexed connection 
+ [ Xyes = Xyes ] 
+ echo exit status 5 over multiplexed connection 
exit status 5 over multiplexed connection
+ verbose test connection multiplexing: status 5 
+ [ X != Xyes ] 
+ echo test connection multiplexing: status 5 
test connection multiplexing: status 5
+ ssh -S /opt/SSH/openssh-3.9p1/regress/ctl-sock otherhost exit 5 
r=5
+ [ 5 -ne 5 ] 
+ trace exit status 5 with early close over multiplexed connection 
+ [ Xyes = Xyes ] 
+ echo exit status 5 with early close over multiplexed connection 
exit status 5 with early close over multiplexed connection
+ ssh -S /opt/SSH/openssh-3.9p1/regress/ctl-sock -n otherhost exec sh -c 'sleep
2; exec > /dev/null 2>&1; sleep 3; exit 5' 
r=5
+ [ 5 -ne 5 ] 
+ trace exit status 44 over multiplexed connection 
+ [ Xyes = Xyes ] 
+ echo exit status 44 over multiplexed connection 
exit status 44 over multiplexed connection
+ verbose test connection multiplexing: status 44 
+ [ X != Xyes ] 
+ echo test connection multiplexing: status 44 
test connection multiplexing: status 44
+ ssh -S /opt/SSH/openssh-3.9p1/regress/ctl-sock otherhost exit 44 
r=44
+ [ 44 -ne 44 ] 
+ trace exit status 44 with early close over multiplexed connection 
+ [ Xyes = Xyes ] 
+ echo exit status 44 with early close over multiplexed connection 
exit status 44 with early close over multiplexed connection
+ ssh -S /opt/SSH/openssh-3.9p1/regress/ctl-sock -n otherhost exec sh -c 'sleep
2; exec > /dev/null 2>&1; sleep 3; exit 44' 
r=44
+ [ 44 -ne 44 ] 
+ cat /opt/SSH/openssh-3.9p1/regress/pidfile 
+ kill 14894 
+ rm -f /opt/SSH/openssh-3.9p1/regress/ctl-sock 
+ cleanup 
+ [ -f /opt/SSH/openssh-3.9p1/regress/pidfile ] 
+ [ 1 -eq 0 ] 
+ echo failed connection multiplexing 
failed connection multiplexing
+ exit 1 
root at qvgdisy3 # 

I don't see what is making an error !

Best Regards,
Eric
	May The OpenSource be with you !


Pour :	ervanborren-ext at airfrance.fr
cc :	secureshell at securityfocus.com 

Objet :	Re: R?f. : openssh-3.9p1 on Solaris 8


>ervanborren-ext at airfrance.fr wrote:
>> What's the matter with openssh3.9p1 during make tests !
>>       I confirm, it is not a problem with X509.
>
>You're using the x.509 patch, but the test fails with a vanilla 3.9p1
>distribution too?
>
>>       It's OK for 3.7.1p1 but not 3.9p1.
>
>The multiplex capability is new and wasn't in 3.7x.
>
>> root at qvgdisy3 # make tests
>> ...
>> run test multiplex.sh ...
>> test connection multiplexing: envpass
>> test connection multiplexing: transfer
>> scp: failed copy /bin/ls
>
>It's probably not this but make sure /bin/ls is world readable.
>
root at qvgdisy3 # ls -l /bin/ls
-r-xr-xr-x   1 root     bin        18844 Jan  6  2000 /bin/ls
root at qvgdisy3 # /bin/ls -l
total 216
-rw-r--r--   1 1000     1000        2280 Jun 25  2004 Makefile
-rw-r--r--   1 1000     1000        3710 Aug 17  2004 README.regress
-rw-r--r--   1 1000     1000         839 Sep  4  2003 agent-getpeereid.sh
-rw-r--r--   1 1000     1000        1076 Nov 15  2003 agent-ptrace.sh
-rw-r--r--   1 1000     1000         921 Sep 13  2003 agent-timeout.sh
-rw-r--r--   1 1000     1000        1975 Sep  4  2003 agent.sh

>The regress tests normally work fine, but when they don't it can be tricky
>to figure out why.
>
>Start by running the test on its own.  From the regress dir, run something
> like this (this is from README.regress with a few extra options):
>
$ PATH=`pwd`/..:$PATH:. TEST_SHELL=/bin/sh TEST_SSH_TRACE=yes \
TEST_SSH_SSHD_CONFOPTS=LogLevel=DEBUG3 sh -x test-exec.sh `pwd` \
multiplex.sh

DONE, see output above.
>
>You may also want to remove the ">/dev/null 2>&1" from the command lines
>in multiplex.sh.

DONE
>
>You can also change the "LogLevel QUIET" in test-exec.sh to "LogLevel
>DEBUG3" and check your syslog.
>
>If it's not apparent what's failing then please open a bug at
>bugzilla.mindrot.org so it can be tracked.

--
Darren Tucker (dtucker at zip.com.au)
GPG key 8FF4FA69 / D9A3 86E9 7EEE AF4B B2D4  37C9 C982 80C7 8FF4 FA69
Good judgement comes with experience. Unfortunately, the experience
usually comes from bad judgement.



------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.




More information about the openssh-bugs mailing list