Disconnecting: protocol error: rcvd type 98

Andrew Stribblehill a.d.stribblehill at durham.ac.uk
Sat Aug 4 00:34:19 EST 2001


When I SSH using protocol 1 from a Debian box running OpenSSH 2.9p2-4
to a sparc.sunos5 box running vanilla OpenSSH 2.9.1, after a little
while (of inactivity?) I get the following message on the client
terminal:

Disconnecting: protocol error: rcvd type 98

Looking further, this message is actually caused by the SSH daemon.
However, I'm at a loss to determine why sshd is doing this.

I attach a sample 'ssh -1 -v -v -v' session client log, and a 'sshd
-d -d -d' log.

If I can help debug this in any way, please say.

-- 
Andrew Stribblehill
Systems programmer, IT Service, University of Durham, England
-------------- next part --------------
OpenSSH_2.9p2, SSH protocols 1.5/2.0, OpenSSL 0x0090602f
debug1: Reading configuration data /home/ads/.ssh/config
debug1: Applying options for polaris
debug1: Applying options for *
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: Applying options for *
debug1: Seeding random number generator
debug1: Rhosts Authentication disabled, originating port will not be trusted.
debug1: restore_uid
debug1: ssh_connect: getuid 1000 geteuid 1000 anon 1
debug1: Connecting to polaris [129.234.2.123] port 2222.
debug1: temporarily_use_uid: 1000/1000 (e=1000)
debug1: restore_uid
debug1: temporarily_use_uid: 1000/1000 (e=1000)
debug1: restore_uid
debug1: Connection established.
debug1: identity file /home/ads/.ssh/identity type 0
debug1: Remote protocol version 1.99, remote software version OpenSSH_2.9p1
debug1: match: OpenSSH_2.9p1 pat ^OpenSSH
debug1: Local version string SSH-1.5-OpenSSH_2.9p2
debug1: Waiting for server public key.
debug1: Received server public key (768 bits) and host key (1024 bits).
debug3: check_host_in_hostfile: filename /home/ads/.ssh/known_hosts
debug3: check_host_in_hostfile: match line 39
debug3: check_host_in_hostfile: filename /home/ads/.ssh/known_hosts
debug3: check_host_in_hostfile: match line 40
debug1: Host 'polaris' is known and matches the RSA1 host key.
debug1: Found key in /home/ads/.ssh/known_hosts:39
debug1: Encryption type: 3des
debug1: Sent encrypted session key.
debug1: Installing crc compensation attack detector.
debug1: Received encrypted confirmation.
debug1: Trying RSA authentication via agent with 'ads at itspc142'
debug1: Received RSA challenge from server.
debug1: Sending response to RSA challenge.
debug1: Remote: RSA authentication accepted.
debug1: RSA authentication accepted by server.
debug1: Requesting pty.
debug2: tty_make_modes: ospeed 38400
debug2: tty_make_modes: ispeed 38400
debug2: tty_make_modes: 1 3
debug2: tty_make_modes: 2 28
debug2: tty_make_modes: 3 127
debug2: tty_make_modes: 4 21
debug2: tty_make_modes: 5 4
debug2: tty_make_modes: 6 255
debug2: tty_make_modes: 7 255
debug2: tty_make_modes: 8 17
debug2: tty_make_modes: 9 19
debug2: tty_make_modes: 10 26
debug2: tty_make_modes: 12 18
debug2: tty_make_modes: 13 23
debug2: tty_make_modes: 14 22
debug2: tty_make_modes: 18 15
debug2: tty_make_modes: 30 0
debug2: tty_make_modes: 31 0
debug2: tty_make_modes: 32 0
debug2: tty_make_modes: 33 0
debug2: tty_make_modes: 34 0
debug2: tty_make_modes: 35 0
debug2: tty_make_modes: 36 1
debug2: tty_make_modes: 37 0
debug2: tty_make_modes: 38 1
debug2: tty_make_modes: 39 1
debug2: tty_make_modes: 40 0
debug2: tty_make_modes: 41 1
debug2: tty_make_modes: 50 1
debug2: tty_make_modes: 51 1
debug2: tty_make_modes: 52 0
debug2: tty_make_modes: 53 1
debug2: tty_make_modes: 54 1
debug2: tty_make_modes: 55 1
debug2: tty_make_modes: 56 0
debug2: tty_make_modes: 57 0
debug2: tty_make_modes: 58 0
debug2: tty_make_modes: 59 1
debug2: tty_make_modes: 60 1
debug2: tty_make_modes: 61 1
debug2: tty_make_modes: 62 0
debug2: tty_make_modes: 70 1
debug2: tty_make_modes: 71 0
debug2: tty_make_modes: 72 1
debug2: tty_make_modes: 73 0
debug2: tty_make_modes: 74 0
debug2: tty_make_modes: 75 0
debug2: tty_make_modes: 90 1
debug2: tty_make_modes: 91 1
debug2: tty_make_modes: 92 0
debug2: tty_make_modes: 93 0
debug1: Requesting X11 forwarding with authentication spoofing.
debug1: Requesting authentication agent forwarding.
debug1: Requesting shell.
debug1: Entering interactive session.
debug1: fd 1 setting O_NONBLOCK
debug1: fd 2 IS O_NONBLOCK
debug3: Trying to reverse map address 129.234.2.142.

wtmp_write: problem writing /var/adm/wtmp: No such file or directory

Last login: Fri Aug  3 14:59:16 2001 from womble.dur.ac.u

Environment:
  USER=dcl0ads
  LOGNAME=dcl0ads
  HOME=/home/jeeves/dit/dcl0ads
  PATH=/usr/bin:/bin:/usr/sbin:/sbin
  MAIL=/var/mail//dcl0ads
  SHELL=/usr/local/bin/bash
  TZ=GB
  SSH_CLIENT=129.234.2.142 3568 2222
  SSH_TTY=/dev/pts/4
  TERM=xterm
  DISPLAY=polaris:10.0
  XAUTHORITY=/tmp/ssh-fCL24467/cookies
  SSH_AUTH_SOCK=/tmp/ssh-CXr24467/agent.24467
Running /usr/openwin/bin/xauth add polaris:10.0 MIT-MAGIC-COOKIE-1 dfeb40c9d56991c81526290c79fa292a
Adding polaris/unix:10.0 MIT-MAGIC-COOKIE-1 dfeb40c9d56991c81526290c79fa292a
The SIRCAM virus appears to have hit a number of systems in the
University.  Please ensure that your virus protection is up to date.  The
current virus definition files have been updated and are 4150 (27 July
2001) and scan engine 4.1.40.
===============================================================================
]0;dcl0ads at polarisYou have no mail
polaris 1$ Disconnecting: protocol error: rcvd type 98
debug1: Calling cleanup 0x805174c(0x0)
debug1: Calling cleanup 0x8062c7c(0x0)
-------------- next part --------------
Script started on Fri Aug 03 15:31:36 2001
# /usr/sbin/sshd -d -d -d -p 2222
debug1: Seeding random number generator
debug1: sshd version OpenSSH_2.9p1
debug1: private host key: #0 type 0 RSA1
debug3: No RSA1 key file /etc/ssh/ssh_host_dsa_key.
debug1: read PEM private key done: type DSA
debug1: private host key: #1 type 2 DSA
debug3: No RSA1 key file /etc/ssh/ssh_host_rsa_key.
debug1: read PEM private key done: type RSA
debug1: private host key: #2 type 1 RSA
debug1: Bind to port 2222 on 0.0.0.0.
Server listening on 0.0.0.0 port 2222.
Generating 768 bit RSA key.
RSA key generation complete.
debug1: Server will not fork when running in debugging mode.
Connection from 129.234.2.142 port 3568
debug1: Client protocol version 1.5; client software version OpenSSH_2.9p2
debug1: match: OpenSSH_2.9p2 pat ^OpenSSH
debug1: Local version string SSH-1.99-OpenSSH_2.9p1
debug1: Rhosts Authentication disabled, originating port not trusted.
debug1: Sent 768 bit server key and 1024 bit host key.
debug1: Encryption type: 3des
debug1: Received session key; encryption turned on.
debug1: Installing crc compensation attack detector.
debug1: Attempting authentication for dcl0ads.
debug1: temporarily_use_uid: 32540/2400 (e=0)
debug1: restore_uid
Accepted rsa for dcl0ads from 129.234.2.142 port 3568
debug1: session_new: init
debug1: session_new: session 0
debug1: Allocating pty.
debug2: tty_parse_modes: ospeed 38400
debug2: tty_parse_modes: ispeed 38400
debug2: tty_parse_modes: 1 3
debug2: tty_parse_modes: 2 28
debug2: tty_parse_modes: 3 127
debug2: tty_parse_modes: 4 21
debug2: tty_parse_modes: 5 4
debug2: tty_parse_modes: 6 255
debug2: tty_parse_modes: 7 255
debug2: tty_parse_modes: 8 17
debug2: tty_parse_modes: 9 19
debug2: tty_parse_modes: 10 26
debug2: tty_parse_modes: 12 18
debug2: tty_parse_modes: 13 23
debug2: tty_parse_modes: 14 22
debug2: tty_parse_modes: 18 15
debug2: tty_parse_modes: 30 0
debug2: tty_parse_modes: 31 0
debug2: tty_parse_modes: 32 0
debug2: tty_parse_modes: 33 0
debug2: tty_parse_modes: 34 0
debug2: tty_parse_modes: 35 0
debug2: tty_parse_modes: 36 1
debug2: tty_parse_modes: 37 0
debug2: tty_parse_modes: 38 1
debug2: tty_parse_modes: 39 1
debug2: tty_parse_modes: 40 0
debug2: tty_parse_modes: 41 1
debug2: tty_parse_modes: 50 1
debug2: tty_parse_modes: 51 1
debug2: tty_parse_modes: 52 0
debug2: tty_parse_modes: 53 1
debug2: tty_parse_modes: 54 1
debug2: tty_parse_modes: 55 1
debug2: tty_parse_modes: 56 0
debug2: tty_parse_modes: 57 0
debug2: tty_parse_modes: 58 0
debug2: tty_parse_modes: 59 1
debug2: tty_parse_modes: 60 1
debug2: tty_parse_modes: 61 1
debug2: tty_parse_modes: 62 0
debug2: tty_parse_modes: 70 1
debug2: tty_parse_modes: 71 0
debug2: tty_parse_modes: 72 1
debug2: tty_parse_modes: 73 0
debug2: tty_parse_modes: 74 0
debug2: tty_parse_modes: 75 0
debug2: tty_parse_modes: 90 1
debug2: tty_parse_modes: 91 1
debug2: tty_parse_modes: 92 0
debug2: tty_parse_modes: 93 0
debug1: Received request for X11 forwarding with auth spoofing.
debug2: SSH_PROTOFLAG_SCREEN_NUMBER: 1
debug1: fd 10 setting O_NONBLOCK
debug1: fd 10 IS O_NONBLOCK
debug1: channel 0: new [X11 inet listener]
debug1: temporarily_use_uid: 32540/2400 (e=0)
debug1: restore_uid
debug1: Received authentication agent forwarding request.
debug1: temporarily_use_uid: 32540/2400 (e=0)
debug1: restore_uid
debug1: fd 11 setting O_NONBLOCK
debug1: fd 11 IS O_NONBLOCK
debug1: channel 1: new [auth socket]
debug1: Entering interactive session.
debug1: fd 8 setting O_NONBLOCK
debug1: fd 9 IS O_NONBLOCK
debug1: server_init_dispatch_13
debug1: server_init_dispatch_15
debug3: tvp!=NULL kid 0 mili 60000
debug3: tvp!=NULL kid 0 mili 10
debug3: tvp!=NULL kid 0 mili 60000
debug3: tvp!=NULL kid 0 mili 60000
debug3: tvp!=NULL kid 0 mili 60000
debug3: tvp!=NULL kid 0 mili 10
debug3: tvp!=NULL kid 0 mili 60000
debug3: tvp!=NULL kid 0 mili 60000
debug3: tvp!=NULL kid 0 mili 60000
debug3: tvp!=NULL kid 0 mili 60000
debug3: tvp!=NULL kid 0 mili 10
debug3: tvp!=NULL kid 0 mili 60000
debug3: tvp!=NULL kid 0 mili 60000
debug3: tvp!=NULL kid 0 mili 10
debug3: tvp!=NULL kid 0 mili 60000
debug3: tvp!=NULL kid 0 mili 60000
debug3: tvp!=NULL kid 0 mili 10
debug3: tvp!=NULL kid 0 mili 60000
debug3: tvp!=NULL kid 0 mili 60000
debug3: tvp!=NULL kid 0 mili 60000
debug3: tvp!=NULL kid 0 mili 60000
Received disconnect from 129.234.2.142: protocol error: rcvd type 98
debug1: Calling cleanup 0x26da0(0x0)
debug1: xauthfile_cleanup_proc called
debug1: Calling cleanup 0x2ea24(0x0)
debug1: channel_free: channel 0: status: The following connections are open:

debug1: channel_free: channel 1: status: The following connections are open:

debug1: Calling cleanup 0x26e04(0xf433c)
debug1: pty_cleanup_proc: /dev/pts/4
wtmp_write: problem writing /var/adm/wtmp: No such file or directory
debug1: Calling cleanup 0x37164(0x0)
# 
script done on Fri Aug 03 15:34:05 2001


More information about the openssh-unix-dev mailing list