[Bug 1288] ssh-add on Cygwin -- can't access ssh-agent socket

bugzilla-daemon at bugzilla.mindrot.org bugzilla-daemon at bugzilla.mindrot.org
Fri Sep 14 19:06:36 EST 2007


http://bugzilla.mindrot.org/show_bug.cgi?id=1288


Tom Ueltschi <bugzilla.mindrot.org at ueltschi.net> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |bugzilla.mindrot.org at ueltsch
                   |                            |i.net




--- Comment #1 from Tom Ueltschi <bugzilla.mindrot.org at ueltschi.net>  2007-09-14 19:06:33 ---
I'm having the same problem. The ssh-agent/ssh-add worked fine until a
few days ago. I didn't update any Cygwin packages in the meantime and
haven't rebooted my PC for a while now (maybe that could fix it?). But
the bug exists.

$ env | grep SSH
SSH_AGENT_PID=3244
SSH_AUTH_SOCK=/tmp/ssh-wA0SC8jY0Y/agent.3372

Content of file: /tmp/ssh-wA0SC8jY0Y/agent.3372
!<socket >2436 s 4E6A720D-ED8DF735-4D2422B5-0FA6178C

>From TCPView I see that process ssh-agent:3244 is listening on UDP port
2437 (not 2436!)

Could this be the problem, that the port number is off by one?


Here some output from TCP Spy that could be useful: (?)

the next process to start and make a socket call will be spyed
process attached, command line='C:\cygwin\bin\ssh-agent.exe'
socket (708) created [family=AF_INET, type=SOCK_STREAM,
protocol=IPPROTO_IP, dwFlags=WSA_FLAG_OVERLAPPED]
socket (708) bound [name=127.0.0.1]
socket (708) determined its local name [name=127.0.0.1:2436]
socket (708) established for listening [backlog=128]
socket (708) set one of its options [level=SOL_SOCKET,
optname=SO_LINGER, l_onoff=1, l_linger=240]
socket (708) closed
process detached
the next process to start and make a socket call will be spyed
process attached, command line='C:\cygwin\bin\ssh-add.exe
"/cygdrive/c/Documents and Settings/ueltschit/.ssh/id_dsa"'
socket (704) created [family=AF_INET, type=SOCK_STREAM,
protocol=IPPROTO_IP, dwFlags=WSA_FLAG_OVERLAPPED]
socket (704) enabled its nonblocking mode
socket (704) connecting synchronously without blocking
[name=127.0.0.1:2436]
socket (704) could not connect - WSAEWOULDBLOCK (A non-blocking socket
operation could not be completed immediately)
socket (676) created [family=AF_INET, type=SOCK_DGRAM,
protocol=IPPROTO_UDP, dwFlags=WSA_FLAG_OVERLAPPED]
socket (676) bound [name=127.0.0.1]
socket (676) determined its local name [name=127.0.0.1:2442]
socket (676) sending a datagram synchronously [len=1,
to=127.0.0.1:2442]
socket (676) sent a datagram that is 1 bytes
0000  00                                                .               
socket (676) receiving a datagram synchronously from its default
address [len=1]
socket (676) received a datagram that is 1 bytes
0000  00                                                .               
socket (704) specified an event object to be associated with the
supplied set of network events and enabled its nonblocking mode
[hEventObject=0, lEvent==0]
socket (704) disabled its nonblocking mode
socket (704) specified an event object to be associated with the
supplied set of network events and enabled its nonblocking mode
[hEventObject=280, lEvent=FD_WRITE|FD_CLOSE]
socket (704) sending data synchronously without blocking [len=4]
socket (704) sent 4 bytes of data
0000  00 00 02 06                                       ....            
socket (704) specified an event object to be associated with the
supplied set of network events and enabled its nonblocking mode
[hEventObject=0, lEvent==0]
socket (704) disabled its nonblocking mode
socket (704) specified an event object to be associated with the
supplied set of network events and enabled its nonblocking mode
[hEventObject=280, lEvent=FD_WRITE|FD_CLOSE]
socket (704) sending data synchronously without blocking [len=518]
socket (704) sent 518 bytes of data


-- 
Configure bugmail: http://bugzilla.mindrot.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching the assignee of the bug.


More information about the openssh-bugs mailing list