Upgraded to 2.9p1 with no luck..

Ladner, Eric (CLAD) CLAD at chevron.com
Sat May 26 05:04:57 EST 2001


Howdy,

After upgrading to 2.9 (OpenSSH_2.9p1, SSH protocols 1.5/2.0, OpenSSL
0x0090600f) 
I'm unable to ssh between two systems any more (the two that I've upgraded).


I've recompiled from the original source several times, each time with no
errors, 
regenerated host keys, regenerated client keys (using rsa), etc., to no
avail.

Below are some relevant snippets of debugging output around where the error
occurs.  
Feel free to contact me regarding any additional information required.  

Output from "ssh -v -v -v pgppt" executed on a HP C240 workstation (HP-UX
11.0, 
PA-RISC 1.1):

...(lines above here deleted)...
debug1: Host 'pgppt.pasms.chevron.com' is known and matches the RSA host
key.
debug1: Found key in /users/clad/.ssh/known_hosts2:3
debug1: bits set: 981/2049
debug1: ssh_rsa_verify: signature correct
debug1: kex_derive_keys
debug1: newkeys: mode 1
debug1: Enabling compression at level 6.
debug1: SSH2_MSG_NEWKEYS sent
debug1: waiting for SSH2_MSG_NEWKEYS
debug1: newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: done: ssh_kex2.
debug1: send SSH2_MSG_SERVICE_REQUEST
debug1: service_accept: ssh-userauth
debug1: got SSH2_MSG_SERVICE_ACCEPT
debug1: authentications that can continue:
publickey,password,keyboard-interactive
debug3: start over, passed a different list
publickey,password,keyboard-interactive
debug3: preferred publickey,password,keyboard-interactive
debug3: authmethod_lookup publickey
debug3: remaining preferred: password,keyboard-interactive
debug3: authmethod_is_enabled publickey
debug1: next auth method to try is publickey
debug1: try pubkey: /users/clad/.ssh/id_rsa
debug3: send_pubkey_test
debug2: we sent a publickey packet, wait for reply
debug1: input_userauth_pk_ok: pkalg ssh-rsa blen 149 lastkey 4001df30 hint 1
debug2: input_userauth_pk_ok: fp
0f:95:05:08:b7:47:eb:dd:37:ae:71:c1:5a:24:4b:20
debug3: sign_and_send_pubkey
debug1: PEM_read_PrivateKey failed
debug1: read PEM private key done: type <unknown>
Enter passphrase for key '/users/clad/.ssh/id_rsa':
debug1: read PEM private key done: type RSA
debug2: ssh_rsa_sign: done
debug1: ssh-userauth2 successful: method publickey
debug3: clear hostkey 0
debug3: clear hostkey 1
debug3: clear hostkey 2
debug1: channel 0: new [client-session]
debug1: channel_new: 0
debug1: send channel open 0
Memory fault

Output from /usr/local/sbin/sshd -ddd -D on server side (HP K460, HP-UX
11.0, 
PA-RISC 1.1):

debug1: Enabling compression at level 6.
debug1: SSH2_MSG_NEWKEYS sent
debug1: waiting for SSH2_MSG_NEWKEYS
debug1: newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: KEX done
debug1: userauth-request for user clad service ssh-connection method none
debug1: attempt 0 failures 0
debug2: input_userauth_request: setting up authctxt for clad
debug2: input_userauth_request: try method none
Failed none for clad from 26.25.12.170 port 49998 ssh2
debug1: userauth-request for user clad service ssh-connection method
publickey
debug1: attempt 1 failures 1
debug2: input_userauth_request: try method publickey
debug1: test whether pkalg/pkblob are acceptable
debug1: temporarily_use_uid: 101/20 (e=0)
debug1: matching key found: file /home/clad/.ssh/authorized_keys2, line 1
debug1: restore_uid
debug2: userauth_pubkey: authenticated 0 pkalg ssh-rsa
Postponed publickey for clad from 26.25.12.170 port 49998 ssh2
debug1: userauth-request for user clad service ssh-connection method
publickey
debug1: attempt 2 failures 1
debug2: input_userauth_request: try method publickey
debug1: temporarily_use_uid: 101/20 (e=0)
debug1: matching key found: file /home/clad/.ssh/authorized_keys2, line 1
debug1: restore_uid
debug1: ssh_rsa_verify: signature correct
debug2: userauth_pubkey: authenticated 1 pkalg ssh-rsa
Accepted publickey for clad from 26.25.12.170 port 49998 ssh2
debug1: Entering interactive session for SSH2.
debug1: server_init_dispatch_20
Connection closed by remote host.
Closing connection to 26.25.12.170
debug1: compress outgoing: raw data 228, compressed 226, factor 0.99
debug1: compress incoming: raw data 609, compressed 372, factor 0.61
debug1: writing PRNG seed to file /root/.ssh/prng_seed




More information about the openssh-unix-dev mailing list