SSH2/1 Failure when using bash shell, other shells work

Chris Newbill cnewbill at support.onewest.net
Thu Jan 11 05:10:48 EST 2001


Additional Info, rebuilt OpenSSL 0.9.6(have also tried 0.9.5a) and OpenSSH,
no luck.

Another strange note, if your default shell is set to /bin/sh (a symlink to
/bin/bash) it lets you login!??

Thanks,
Chris Newbill
  -----Original Message-----
  From: Chris Newbill [mailto:cnewbill at support.onewest.net]
  Sent: Wednesday, January 10, 2001 10:11 AM
  To: openssh-unix-dev at mindrot.org
  Subject: SSH2/1 Failure when using bash shell, other shells work


  Got a strange problem here.  We have OpenSSH 2.3.0p1 running on a variety
of machines and on one particular Redhat 6.2 machine(all patches applied) we
run into a situation where it will not allow us to start a shell when using
bash or bash2.  csh and others work fine.

  One note...if I enable PermitRootLogin, the user root IS allowed to login
with bash.  This is very strange.  I'm guessing it must be some kind of
permissions problem, but I have checked everything I can think of: sshd
configs, pam configs, permissions on user data, permissions on ssh pieces,
etc.

  Here is the debug report for SSH Protocol 2. (generated using sshd -ddd)

  When using /bin/bash (GNU bash, version 1.14.7(1)) as a shell
  When using csh it works fine and allows us to login.

  debug1: Seeding random number generator
  debug1: read DSA private key done
  debug1: Seeding random number generator
  debug1: Bind to port 22 on 0.0.0.0.
  Server listening on 0.0.0.0 port 22.
  Generating 768 bit RSA key.
  debug1: Seeding random number generator
  debug1: Seeding random number generator
  RSA key generation complete.
  debug1: Server will not fork when running in debugging mode.
  Connection from 206.58.180.12 port 3754
  debug1: Client protocol version 2.0; client software version PuTTY
  debug1: no match: PuTTY
  Enabling compatibility mode for protocol 2.0
  debug1: Local version string SSH-1.99-OpenSSH_2.3.0p1
  debug1: send KEXINIT
  debug1: done
  debug1: wait KEXINIT
  debug1: got kexinit: diffie-hellman-group1-sha1
  debug1: got kexinit: ssh-dss
  debug1: got kexinit: blowfish-cbc,blowfish-cbc,3des-cbc
  debug1: got kexinit: blowfish-cbc,blowfish-cbc,3des-cbc
  debug1: got kexinit: hmac-sha1,hmac-md5,none
  debug1: got kexinit: hmac-sha1,hmac-md5,none
  debug1: got kexinit: none
  debug1: got kexinit: none
  debug1: got kexinit:
  debug1: got kexinit:
  debug1: first kex follow: 0
  debug1: reserved: 0
  debug1: done
  debug1: kex: client->server blowfish-cbc hmac-sha1 none
  debug1: kex: server->client blowfish-cbc hmac-sha1 none
  debug1: Wait SSH2_MSG_KEXDH_INIT.
  debug1: bits set: 492/1024
  debug1: bits set: 522/1024
  debug1: sig size 20 20
  debug1: send SSH2_MSG_NEWKEYS.
  debug1: done: send SSH2_MSG_NEWKEYS.
  debug1: Wait SSH2_MSG_NEWKEYS.
  debug1: GOT SSH2_MSG_NEWKEYS.
  debug1: done: KEX2.
  debug1: userauth-request for user cnewbill service ssh-connection method
password
  debug1: attempt #1
  debug2: input_userauth_request: setting up authctxt for cnewbill
  debug1: Starting up PAM with username "cnewbill"
  debug2: input_userauth_request: try method password
  debug1: PAM Password authentication accepted for user "cnewbill"
  debug1: PAM setting rhost to "cnewbill.onewest.net"
  Accepted password for cnewbill from 206.58.180.12 port 3754 ssh2
  debug1: Entering interactive session for SSH2.
  debug1: server_init_dispatch_20
  debug1: server_input_channel_open: ctype session rchan 100 win 32768 max
16384
  debug1: open session
  debug1: channel 0: new [server-session]
  debug1: session_new: init
  debug1: session_new: session 0
  debug1: session_open: channel 0
  debug1: session_open: session 0: link with channel 0
  debug1: confirm session
  debug2: callback start
  debug1: session_by_channel: session 0 channel 0
  debug1: session_input_channel_req: session 0 channel 0 request pty-req
reply 1
  debug1: session_pty_req: session 0 alloc /dev/pts/4
  debug2: callback done
  debug2: callback start
  debug1: session_by_channel: session 0 channel 0
  debug1: session_input_channel_req: session 0 channel 0 request shell reply
1
  debug1: PAM setting tty to "/dev/pts/4"
  debug1: PAM establishing creds
  debug1: fd 7 setting O_NONBLOCK
  debug1: fd 3 IS O_NONBLOCK
  debug2: callback done
  debug1: Setting controlling tty using TIOCSCTTY.
  debug2: channel 0: rcvd adjust 315
  ???debug1: Received SIGCHLD.???
  debug1: session_by_pid: pid 4903
  debug1: session_exit_message: session 0 channel 0 pid 4903
  debug1: session_exit_message: release channel 0
  debug1: channel 0: write failed
  debug1: channel 0: output open -> closed
  debug1: channel 0: close_write
  debug1: channel 0: read failed
  debug1: channel 0: input open -> drain
  debug1: channel 0: close_read
  debug1: channel 0: input: no drain shortcut
  debug1: channel 0: ibuf empty
  debug1: channel 0: input drain -> closed
  debug1: channel 0: send eof
  debug1: session_pty_cleanup: session 0 release /dev/pts/4
  debug1: session_free: session 0 pid 4903
  debug1: channel 0: send close
  debug2: channel 0: rcvd adjust 7
  debug1: channel 0: rcvd close
  ***fatal: buffer_get: trying to get more bytes than in buffer***
  debug1: Calling cleanup 0x805b6f0(0x0)
  debug1: Calling cleanup 0x8050980(0x0)
  debug1: Calling cleanup 0x8061750(0x0)

  Now for SSH Protocol 1 attempt

  debug1: sshd version OpenSSH_2.3.0p1
  debug1: Seeding random number generator
  debug1: read DSA private key done
  debug1: Seeding random number generator
  debug1: Bind to port 22 on 0.0.0.0.
  Server listening on 0.0.0.0 port 22.
  Generating 768 bit RSA key.
  debug1: Seeding random number generator
  debug1: Seeding random number generator
  RSA key generation complete.
  debug1: Server will not fork when running in debugging mode.
  Connection from 206.58.180.12 port 3791
  debug1: Client protocol version 1.5; client software version PuTTY
  debug1: no match: PuTTY
  debug1: Local version string SSH-1.99-OpenSSH_2.3.0p1
  debug1: Sent 768 bit public key and 1024 bit host key.
  debug1: Encryption type: 3des
  debug1: Received session key; encryption turned on.
  debug1: Installing crc compensation attack detector.
  debug1: Starting up PAM with username "cnewbill"
  debug1: Attempting authentication for cnewbill.
  Accepted password for cnewbill from 206.58.180.12 port 3791
  debug1: PAM setting rhost to "cnewbill.onewest.net"
  debug1: session_new: init
  debug1: session_new: session 0
  debug1: Allocating pty.
  debug1: PAM setting tty to "/dev/pts/4"
  debug1: PAM establishing creds
  debug1: Entering interactive session.
  debug1: fd 3 setting O_NONBLOCK
  debug1: fd 7 IS O_NONBLOCK
  debug1: server_init_dispatch_13
  debug1: server_init_dispatch_15
  debug1: Setting controlling tty using TIOCSCTTY.
  debug1: tvp!=NULL kid 0 mili 10
  debug1: tvp!=NULL kid 0 mili 10
  debug1: tvp!=NULL kid 0 mili 10
  debug1: Received SIGCHLD.
  debug1: tvp!=NULL kid 1 mili 100
  debug1: End of interactive session; stdin 0, stdout (read 323, sent 323),
stderr 0 bytes.
  debug1: Command exited with status 0.
  debug1: Received exit confirmation.
  debug1: session_pty_cleanup: session 0 release /dev/pts/4
  Closing connection to 206.58.180.12

  Thanks,

  Chris Newbill
  Programmer/Analyst
  OneWest.net Inc.,
  406-449-8056
  ------------------------------------------------------------
  Ever notice how it's a penny for your thoughts, yet you put
  in your two-cents? Someone is making a penny on the deal.
  -----Steven Wright
  ------------------------------------------------------------


-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.mindrot.org/pipermail/openssh-unix-dev/attachments/20010110/2c4d5618/attachment.html 


More information about the openssh-unix-dev mailing list