Disconnecting: protocol error: rcvd type 98
Markus Friedl
markus.friedl at informatik.uni-erlangen.de
Sat Aug 4 06:15:20 EST 2001
in serverloop.c:wait_until...
add compat20 like this:
if (compat20 &&
max_time_milliseconds == 0 && options.client_alive_interval) {
client_alive_scheduled = 1;
max_time_milliseconds = options.client_alive_interval * 1000;
}
On Fri, Aug 03, 2001 at 03:34:19PM +0100, Andrew Stribblehill wrote:
> When I SSH using protocol 1 from a Debian box running OpenSSH 2.9p2-4
> to a sparc.sunos5 box running vanilla OpenSSH 2.9.1, after a little
> while (of inactivity?) I get the following message on the client
> terminal:
>
> Disconnecting: protocol error: rcvd type 98
>
> Looking further, this message is actually caused by the SSH daemon.
> However, I'm at a loss to determine why sshd is doing this.
>
> I attach a sample 'ssh -1 -v -v -v' session client log, and a 'sshd
> -d -d -d' log.
>
> If I can help debug this in any way, please say.
>
> --
> Andrew Stribblehill
> Systems programmer, IT Service, University of Durham, England
> OpenSSH_2.9p2, SSH protocols 1.5/2.0, OpenSSL 0x0090602f
> debug1: Reading configuration data /home/ads/.ssh/config
> debug1: Applying options for polaris
> debug1: Applying options for *
> debug1: Reading configuration data /etc/ssh/ssh_config
> debug1: Applying options for *
> debug1: Seeding random number generator
> debug1: Rhosts Authentication disabled, originating port will not be trusted.
> debug1: restore_uid
> debug1: ssh_connect: getuid 1000 geteuid 1000 anon 1
> debug1: Connecting to polaris [129.234.2.123] port 2222.
> debug1: temporarily_use_uid: 1000/1000 (e=1000)
> debug1: restore_uid
> debug1: temporarily_use_uid: 1000/1000 (e=1000)
> debug1: restore_uid
> debug1: Connection established.
> debug1: identity file /home/ads/.ssh/identity type 0
> debug1: Remote protocol version 1.99, remote software version OpenSSH_2.9p1
> debug1: match: OpenSSH_2.9p1 pat ^OpenSSH
> debug1: Local version string SSH-1.5-OpenSSH_2.9p2
> debug1: Waiting for server public key.
> debug1: Received server public key (768 bits) and host key (1024 bits).
> debug3: check_host_in_hostfile: filename /home/ads/.ssh/known_hosts
> debug3: check_host_in_hostfile: match line 39
> debug3: check_host_in_hostfile: filename /home/ads/.ssh/known_hosts
> debug3: check_host_in_hostfile: match line 40
> debug1: Host 'polaris' is known and matches the RSA1 host key.
> debug1: Found key in /home/ads/.ssh/known_hosts:39
> debug1: Encryption type: 3des
> debug1: Sent encrypted session key.
> debug1: Installing crc compensation attack detector.
> debug1: Received encrypted confirmation.
> debug1: Trying RSA authentication via agent with 'ads at itspc142'
> debug1: Received RSA challenge from server.
> debug1: Sending response to RSA challenge.
> debug1: Remote: RSA authentication accepted.
> debug1: RSA authentication accepted by server.
> debug1: Requesting pty.
> debug2: tty_make_modes: ospeed 38400
> debug2: tty_make_modes: ispeed 38400
> debug2: tty_make_modes: 1 3
> debug2: tty_make_modes: 2 28
> debug2: tty_make_modes: 3 127
> debug2: tty_make_modes: 4 21
> debug2: tty_make_modes: 5 4
> debug2: tty_make_modes: 6 255
> debug2: tty_make_modes: 7 255
> debug2: tty_make_modes: 8 17
> debug2: tty_make_modes: 9 19
> debug2: tty_make_modes: 10 26
> debug2: tty_make_modes: 12 18
> debug2: tty_make_modes: 13 23
> debug2: tty_make_modes: 14 22
> debug2: tty_make_modes: 18 15
> debug2: tty_make_modes: 30 0
> debug2: tty_make_modes: 31 0
> debug2: tty_make_modes: 32 0
> debug2: tty_make_modes: 33 0
> debug2: tty_make_modes: 34 0
> debug2: tty_make_modes: 35 0
> debug2: tty_make_modes: 36 1
> debug2: tty_make_modes: 37 0
> debug2: tty_make_modes: 38 1
> debug2: tty_make_modes: 39 1
> debug2: tty_make_modes: 40 0
> debug2: tty_make_modes: 41 1
> debug2: tty_make_modes: 50 1
> debug2: tty_make_modes: 51 1
> debug2: tty_make_modes: 52 0
> debug2: tty_make_modes: 53 1
> debug2: tty_make_modes: 54 1
> debug2: tty_make_modes: 55 1
> debug2: tty_make_modes: 56 0
> debug2: tty_make_modes: 57 0
> debug2: tty_make_modes: 58 0
> debug2: tty_make_modes: 59 1
> debug2: tty_make_modes: 60 1
> debug2: tty_make_modes: 61 1
> debug2: tty_make_modes: 62 0
> debug2: tty_make_modes: 70 1
> debug2: tty_make_modes: 71 0
> debug2: tty_make_modes: 72 1
> debug2: tty_make_modes: 73 0
> debug2: tty_make_modes: 74 0
> debug2: tty_make_modes: 75 0
> debug2: tty_make_modes: 90 1
> debug2: tty_make_modes: 91 1
> debug2: tty_make_modes: 92 0
> debug2: tty_make_modes: 93 0
> debug1: Requesting X11 forwarding with authentication spoofing.
> debug1: Requesting authentication agent forwarding.
> debug1: Requesting shell.
> debug1: Entering interactive session.
> debug1: fd 1 setting O_NONBLOCK
> debug1: fd 2 IS O_NONBLOCK
> debug3: Trying to reverse map address 129.234.2.142.
> wtmp_write: problem writing /var/adm/wtmp: No such file or directory
> Last login: Fri Aug 3 14:59:16 2001 from womble.dur.ac.u
> Environment:
> USER=dcl0ads
> LOGNAME=dcl0ads
> HOME=/home/jeeves/dit/dcl0ads
> PATH=/usr/bin:/bin:/usr/sbin:/sbin
> MAIL=/var/mail//dcl0ads
> SHELL=/usr/local/bin/bash
> TZ=GB
> SSH_CLIENT=129.234.2.142 3568 2222
> SSH_TTY=/dev/pts/4
> TERM=xterm
> DISPLAY=polaris:10.0
> XAUTHORITY=/tmp/ssh-fCL24467/cookies
> SSH_AUTH_SOCK=/tmp/ssh-CXr24467/agent.24467
> Running /usr/openwin/bin/xauth add polaris:10.0 MIT-MAGIC-COOKIE-1 dfeb40c9d56991c81526290c79fa292a
> Adding polaris/unix:10.0 MIT-MAGIC-COOKIE-1 dfeb40c9d56991c81526290c79fa292a
> The SIRCAM virus appears to have hit a number of systems in the
> University. Please ensure that your virus protection is up to date. The
> current virus definition files have been updated and are 4150 (27 July
> 2001) and scan engine 4.1.40.
> ===============================================================================
> ]0;dcl0ads at polarisYou have no mail
> polaris 1$ Disconnecting: protocol error: rcvd type 98
> debug1: Calling cleanup 0x805174c(0x0)
> debug1: Calling cleanup 0x8062c7c(0x0)
> Script started on Fri Aug 03 15:31:36 2001
> # /usr/sbin/sshd -d -d -d -p 2222
> debug1: Seeding random number generator
> debug1: sshd version OpenSSH_2.9p1
> debug1: private host key: #0 type 0 RSA1
> debug3: No RSA1 key file /etc/ssh/ssh_host_dsa_key.
> debug1: read PEM private key done: type DSA
> debug1: private host key: #1 type 2 DSA
> debug3: No RSA1 key file /etc/ssh/ssh_host_rsa_key.
> debug1: read PEM private key done: type RSA
> debug1: private host key: #2 type 1 RSA
> debug1: Bind to port 2222 on 0.0.0.0.
> Server listening on 0.0.0.0 port 2222.
> Generating 768 bit RSA key.
> RSA key generation complete.
> debug1: Server will not fork when running in debugging mode.
> Connection from 129.234.2.142 port 3568
> debug1: Client protocol version 1.5; client software version OpenSSH_2.9p2
> debug1: match: OpenSSH_2.9p2 pat ^OpenSSH
> debug1: Local version string SSH-1.99-OpenSSH_2.9p1
> debug1: Rhosts Authentication disabled, originating port not trusted.
> debug1: Sent 768 bit server key and 1024 bit host key.
> debug1: Encryption type: 3des
> debug1: Received session key; encryption turned on.
> debug1: Installing crc compensation attack detector.
> debug1: Attempting authentication for dcl0ads.
> debug1: temporarily_use_uid: 32540/2400 (e=0)
> debug1: restore_uid
> Accepted rsa for dcl0ads from 129.234.2.142 port 3568
> debug1: session_new: init
> debug1: session_new: session 0
> debug1: Allocating pty.
> debug2: tty_parse_modes: ospeed 38400
> debug2: tty_parse_modes: ispeed 38400
> debug2: tty_parse_modes: 1 3
> debug2: tty_parse_modes: 2 28
> debug2: tty_parse_modes: 3 127
> debug2: tty_parse_modes: 4 21
> debug2: tty_parse_modes: 5 4
> debug2: tty_parse_modes: 6 255
> debug2: tty_parse_modes: 7 255
> debug2: tty_parse_modes: 8 17
> debug2: tty_parse_modes: 9 19
> debug2: tty_parse_modes: 10 26
> debug2: tty_parse_modes: 12 18
> debug2: tty_parse_modes: 13 23
> debug2: tty_parse_modes: 14 22
> debug2: tty_parse_modes: 18 15
> debug2: tty_parse_modes: 30 0
> debug2: tty_parse_modes: 31 0
> debug2: tty_parse_modes: 32 0
> debug2: tty_parse_modes: 33 0
> debug2: tty_parse_modes: 34 0
> debug2: tty_parse_modes: 35 0
> debug2: tty_parse_modes: 36 1
> debug2: tty_parse_modes: 37 0
> debug2: tty_parse_modes: 38 1
> debug2: tty_parse_modes: 39 1
> debug2: tty_parse_modes: 40 0
> debug2: tty_parse_modes: 41 1
> debug2: tty_parse_modes: 50 1
> debug2: tty_parse_modes: 51 1
> debug2: tty_parse_modes: 52 0
> debug2: tty_parse_modes: 53 1
> debug2: tty_parse_modes: 54 1
> debug2: tty_parse_modes: 55 1
> debug2: tty_parse_modes: 56 0
> debug2: tty_parse_modes: 57 0
> debug2: tty_parse_modes: 58 0
> debug2: tty_parse_modes: 59 1
> debug2: tty_parse_modes: 60 1
> debug2: tty_parse_modes: 61 1
> debug2: tty_parse_modes: 62 0
> debug2: tty_parse_modes: 70 1
> debug2: tty_parse_modes: 71 0
> debug2: tty_parse_modes: 72 1
> debug2: tty_parse_modes: 73 0
> debug2: tty_parse_modes: 74 0
> debug2: tty_parse_modes: 75 0
> debug2: tty_parse_modes: 90 1
> debug2: tty_parse_modes: 91 1
> debug2: tty_parse_modes: 92 0
> debug2: tty_parse_modes: 93 0
> debug1: Received request for X11 forwarding with auth spoofing.
> debug2: SSH_PROTOFLAG_SCREEN_NUMBER: 1
> debug1: fd 10 setting O_NONBLOCK
> debug1: fd 10 IS O_NONBLOCK
> debug1: channel 0: new [X11 inet listener]
> debug1: temporarily_use_uid: 32540/2400 (e=0)
> debug1: restore_uid
> debug1: Received authentication agent forwarding request.
> debug1: temporarily_use_uid: 32540/2400 (e=0)
> debug1: restore_uid
> debug1: fd 11 setting O_NONBLOCK
> debug1: fd 11 IS O_NONBLOCK
> debug1: channel 1: new [auth socket]
> debug1: Entering interactive session.
> debug1: fd 8 setting O_NONBLOCK
> debug1: fd 9 IS O_NONBLOCK
> debug1: server_init_dispatch_13
> debug1: server_init_dispatch_15
> debug3: tvp!=NULL kid 0 mili 60000
> debug3: tvp!=NULL kid 0 mili 10
> debug3: tvp!=NULL kid 0 mili 60000
> debug3: tvp!=NULL kid 0 mili 60000
> debug3: tvp!=NULL kid 0 mili 60000
> debug3: tvp!=NULL kid 0 mili 10
> debug3: tvp!=NULL kid 0 mili 60000
> debug3: tvp!=NULL kid 0 mili 60000
> debug3: tvp!=NULL kid 0 mili 60000
> debug3: tvp!=NULL kid 0 mili 60000
> debug3: tvp!=NULL kid 0 mili 10
> debug3: tvp!=NULL kid 0 mili 60000
> debug3: tvp!=NULL kid 0 mili 60000
> debug3: tvp!=NULL kid 0 mili 10
> debug3: tvp!=NULL kid 0 mili 60000
> debug3: tvp!=NULL kid 0 mili 60000
> debug3: tvp!=NULL kid 0 mili 10
> debug3: tvp!=NULL kid 0 mili 60000
> debug3: tvp!=NULL kid 0 mili 60000
> debug3: tvp!=NULL kid 0 mili 60000
> debug3: tvp!=NULL kid 0 mili 60000
> Received disconnect from 129.234.2.142: protocol error: rcvd type 98
> debug1: Calling cleanup 0x26da0(0x0)
> debug1: xauthfile_cleanup_proc called
> debug1: Calling cleanup 0x2ea24(0x0)
> debug1: channel_free: channel 0: status: The following connections are open:
>
> debug1: channel_free: channel 1: status: The following connections are open:
>
> debug1: Calling cleanup 0x26e04(0xf433c)
> debug1: pty_cleanup_proc: /dev/pts/4
> wtmp_write: problem writing /var/adm/wtmp: No such file or directory
> debug1: Calling cleanup 0x37164(0x0)
> #
> script done on Fri Aug 03 15:34:05 2001
More information about the openssh-unix-dev
mailing list