Unrelated (was RE: so-called-hang-on-exit)

Eric Garff egarff at omniture.com
Thu Aug 8 05:03:21 EST 2002


Ok, this is going to be a long email (therefore I apologize in advance,
but I figured this may help), but here is my debug data first will be
the "ssh -v -v -v" both command line execution, then cron run, followed
by the sshd with the LogLevel DEBUG3 set (command line execution and
cron execution respectively), it hangs every time with the cron ssh
execution:

--------------------ssh run from command line-----------------------

dev13:	OpenSSH_3.4p1, SSH protocols 1.5/2.0, OpenSSL 0x0090603f
debug1: Reading configuration data /etc/ssh_config
debug1: Rhosts Authentication disabled, originating port will not be
trusted.
debug1: ssh_connect: needpriv 0
debug1: Connecting to dev13 [10.10.0.113] port 22.
debug1: Connection established.
debug1: identity file /home/glb/.ssh/identity type 0
debug1: identity file /home/glb/.ssh/id_rsa type -1
debug3: Not a RSA1 key file /home/glb/.ssh/id_dsa.
debug2: key_type_from_name: unknown key type '-----BEGIN'
debug3: key_read: no key found
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug2: key_type_from_name: unknown key type '-----END'
debug3: key_read: no key found
debug1: identity file /home/glb/.ssh/id_dsa type 2
debug1: Remote protocol version 2.0, remote software version
OpenSSH_3.4p1
debug1: match: OpenSSH_3.4p1 pat OpenSSH*
Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_3.4p1
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug2: kex_parse_kexinit:
diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
debug2: kex_parse_kexinit:
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc at lysator.liu.se
debug2: kex_parse_kexinit:
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc at lysator.liu.se
debug2: kex_parse_kexinit:
hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit:
hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none
debug2: kex_parse_kexinit: none
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: first_kex_follows 0 
debug2: kex_parse_kexinit: reserved 0 
debug2: kex_parse_kexinit:
diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-dss
debug2: kex_parse_kexinit:
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc at lysator.liu.se
debug2: kex_parse_kexinit:
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc at lysator.liu.se
debug2: kex_parse_kexinit:
hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit:
hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: first_kex_follows 0 
debug2: kex_parse_kexinit: reserved 0 
debug2: mac_init: found hmac-md5
debug1: kex: server->client aes128-cbc hmac-md5 none
debug2: mac_init: found hmac-md5
debug1: kex: client->server aes128-cbc hmac-md5 none
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
debug1: dh_gen_key: priv key bits set: 139/256
debug1: bits set: 1582/3191
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
debug3: check_host_in_hostfile: filename /home/glb/.ssh/known_hosts
debug3: check_host_in_hostfile: match line 1
debug3: check_host_in_hostfile: filename /home/glb/.ssh/known_hosts
debug3: check_host_in_hostfile: match line 1
debug1: Host 'dev13' is known and matches the DSA host key.
debug1: Found key in /home/glb/.ssh/known_hosts:1
debug1: bits set: 1601/3191
debug1: ssh_dss_verify: signature correct
debug1: kex_derive_keys
debug1: newkeys: mode 1
debug1: SSH2_MSG_NEWKEYS sent
debug1: waiting for SSH2_MSG_NEWKEYS
debug1: newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: done: ssh_kex2.
debug1: send SSH2_MSG_SERVICE_REQUEST
debug1: service_accept: ssh-userauth
debug1: got SSH2_MSG_SERVICE_ACCEPT
debug1: authentications that can continue:
publickey,password,keyboard-interactive
debug3: start over, passed a different list
publickey,password,keyboard-interactive
debug3: preferred publickey,keyboard-interactive,password
debug3: authmethod_lookup publickey
debug3: remaining preferred: keyboard-interactive,password
debug3: authmethod_is_enabled publickey
debug1: next auth method to try is publickey
debug1: try privkey: /home/glb/.ssh/id_rsa
debug3: no such identity: /home/glb/.ssh/id_rsa
debug1: try pubkey: /home/glb/.ssh/id_dsa
debug3: send_pubkey_test
debug2: we sent a publickey packet, wait for reply
debug1: input_userauth_pk_ok: pkalg ssh-dss blen 434 lastkey 0x81011d0
hint 2
debug2: input_userauth_pk_ok: fp
25:48:a7:14:e6:a0:b6:67:b2:b4:d6:a0:be:b3:98:8bdebug3:
sign_and_send_pubkey
debug1: read PEM private key done: type DSA
debug1: ssh-userauth2 successful: method publickey
debug1: fd 6 setting O_NONBLOCK
debug1: channel 0: new [client-session]
debug3: ssh_session2_open: channel_new: 0
debug1: send channel open 0
debug1: Entering interactive session.
debug2: callback start
debug1: ssh_session2_setup: id 0
debug1: Sending command: /bin/ls
/usr/local/apache/logs/superstats/inserts | /usr/bin/wc -l;/bin/ls
/home/glb/ready | /usr/bin/wc -l;/bin/ls /home/glb/stats | /usr/bin/wc
-l
debug1: channel request 0: exec
debug2: callback done
debug1: channel 0: open confirm rwindow 0 rmax 32768
debug2: channel 0: rcvd adjust 131072
debug1: client_input_channel_req: channel 0 rtype exit-status reply 0
debug1: channel 0: rcvd eof
debug1: channel 0: output open -> drain
debug1: channel 0: obuf empty
debug1: channel 0: close_write
debug1: channel 0: output drain -> closed
debug1: channel 0: rcvd close
debug1: channel 0: close_read
debug1: channel 0: input open -> closed
debug3: channel 0: will not send data after close
debug1: channel 0: almost dead
debug1: channel 0: gc: notify user
debug1: channel 0: gc: user detached
debug1: channel 0: send close
debug1: channel 0: is dead
debug1: channel 0: garbage collecting
debug1: channel_free: channel 0: client-session, nchannels 1
debug3: channel_free: status: The following connections are open:
  #0 client-session (t4 r0 i3/0 o3/0 fd -1/-1)

debug3: channel_close_fds: channel 0: r -1 w -1 e 7
debug1: fd 1 clearing O_NONBLOCK
debug1: Transferred: stdin 0, stdout 0, stderr 0 bytes in 0.7 seconds
debug1: Bytes per second: stdin 0.0, stdout 0.0, stderr 0.0
debug1: Exit status 0

----------------------------ssh run from cron-------------------

dev13:	OpenSSH_3.4p1, SSH protocols 1.5/2.0, OpenSSL 0x0090603f
debug1: Reading configuration data /etc/ssh_config
debug1: Rhosts Authentication disabled, originating port will not be
trusted.
debug1: ssh_connect: needpriv 0
debug1: Connecting to dev13 [10.10.0.113] port 22.
debug1: Connection established.
debug1: identity file /home/glb/.ssh/identity type 0
debug1: identity file /home/glb/.ssh/id_rsa type -1
debug3: Not a RSA1 key file /home/glb/.ssh/id_dsa.
debug2: key_type_from_name: unknown key type '-----BEGIN'
debug3: key_read: no key found
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug3: key_read: no space
debug2: key_type_from_name: unknown key type '-----END'
debug3: key_read: no key found
debug1: identity file /home/glb/.ssh/id_dsa type 2
debug1: Remote protocol version 2.0, remote software version
OpenSSH_3.4p1
debug1: match: OpenSSH_3.4p1 pat OpenSSH*
Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_3.4p1
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug2: kex_parse_kexinit:
diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
debug2: kex_parse_kexinit:
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc at lysator.liu.se
debug2: kex_parse_kexinit:
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc at lysator.liu.se
debug2: kex_parse_kexinit:
hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit:
hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none
debug2: kex_parse_kexinit: none
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: first_kex_follows 0 
debug2: kex_parse_kexinit: reserved 0 
debug2: kex_parse_kexinit:
diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-dss
debug2: kex_parse_kexinit:
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc at lysator.liu.se
debug2: kex_parse_kexinit:
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc at lysator.liu.se
debug2: kex_parse_kexinit:
hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit:
hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: first_kex_follows 0 
debug2: kex_parse_kexinit: reserved 0 
debug2: mac_init: found hmac-md5
debug1: kex: server->client aes128-cbc hmac-md5 none
debug2: mac_init: found hmac-md5
debug1: kex: client->server aes128-cbc hmac-md5 none
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
debug1: dh_gen_key: priv key bits set: 112/256
debug1: bits set: 1545/3191
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
debug3: check_host_in_hostfile: filename /home/glb/.ssh/known_hosts
debug3: check_host_in_hostfile: match line 1
debug3: check_host_in_hostfile: filename /home/glb/.ssh/known_hosts
debug3: check_host_in_hostfile: match line 1
debug1: Host 'dev13' is known and matches the DSA host key.
debug1: Found key in /home/glb/.ssh/known_hosts:1
debug1: bits set: 1540/3191
debug1: ssh_dss_verify: signature correct
debug1: kex_derive_keys
debug1: newkeys: mode 1
debug1: SSH2_MSG_NEWKEYS sent
debug1: waiting for SSH2_MSG_NEWKEYS
debug1: newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: done: ssh_kex2.
debug1: send SSH2_MSG_SERVICE_REQUEST
debug1: service_accept: ssh-userauth
debug1: got SSH2_MSG_SERVICE_ACCEPT
debug1: authentications that can continue:
publickey,password,keyboard-interactive
debug3: start over, passed a different list
publickey,password,keyboard-interactive
debug3: preferred publickey,keyboard-interactive,password
debug3: authmethod_lookup publickey
debug3: remaining preferred: keyboard-interactive,password
debug3: authmethod_is_enabled publickey
debug1: next auth method to try is publickey
debug1: try privkey: /home/glb/.ssh/id_rsa
debug3: no such identity: /home/glb/.ssh/id_rsa
debug1: try pubkey: /home/glb/.ssh/id_dsa
debug3: send_pubkey_test
debug2: we sent a publickey packet, wait for reply
debug1: input_userauth_pk_ok: pkalg ssh-dss blen 434 lastkey 0x81009f8
hint 2
debug2: input_userauth_pk_ok: fp
25:48:a7:14:e6:a0:b6:67:b2:b4:d6:a0:be:b3:98:8bdebug3:
sign_and_send_pubkey
debug1: read PEM private key done: type DSA
debug1: ssh-userauth2 successful: method publickey
debug1: fd 5 setting O_NONBLOCK
debug1: fd 6 setting O_NONBLOCK
debug1: fd 9 setting O_NONBLOCK
debug1: channel 0: new [client-session]
debug3: ssh_session2_open: channel_new: 0
debug1: send channel open 0
debug1: Entering interactive session.
debug2: callback start
debug1: ssh_session2_setup: id 0
debug1: Sending command: /bin/ls
/usr/local/apache/logs/superstats/inserts | /usr/bin/wc -l;/bin/ls
/home/glb/ready | /usr/bin/wc -l;/bin/ls /home/glb/stats | /usr/bin/wc
-l
debug1: channel request 0: exec
debug2: callback done
debug1: channel 0: open confirm rwindow 0 rmax 32768
debug2: channel 0: rcvd adjust 131072
debug1: channel 0: read<=0 rfd 5 len 0
debug1: channel 0: read failed
debug1: channel 0: close_read
debug1: channel 0: input open -> drain
debug1: channel 0: ibuf empty
debug1: channel 0: send eof
debug1: channel 0: input drain -> closed
debug1: client_input_channel_req: channel 0 rtype exit-status reply 0
debug1: channel 0: rcvd eof
debug1: channel 0: output open -> drain
debug1: channel 0: rcvd close
debug3: channel 0: will not send data after close
killing pid 4473	debug1: channel_free: channel 0: client-session,
nchannels 1
debug3: channel_free: status: The following connections are open:
  #0 client-session (t4 r0 i3/0 o1/8 fd -1/6)

debug3: channel_close_fds: channel 0: r -1 w 6 e 9
debug1: fd 0 clearing O_NONBLOCK
debug1: fd 1 clearing O_NONBLOCK
debug1: fd 2 clearing O_NONBLOCK
Killed by signal 15.
debug1: Calling cleanup 0x8057a1c(0x0)
debug1: Calling cleanup 0x8061a38(0x0)

----------- sshd (ssh commandline execution) -----------------

Aug  7 11:49:26 dev13 sshd[12279]: debug1: Forked child 12319.
Aug  7 11:49:26 dev13 sshd[12319]: Connection from 10.10.0.114 port 2579
Aug  7 11:49:26 dev13 sshd[12319]: debug1: Client protocol version 2.0;
client software version OpenSSH_3.4p1
Aug  7 11:49:26 dev13 sshd[12319]: debug1: match: OpenSSH_3.4p1 pat
OpenSSH*
Aug  7 11:49:26 dev13 sshd[12319]: Enabling compatibility mode for
protocol 2.0
Aug  7 11:49:26 dev13 sshd[12319]: debug1: Local version string
SSH-2.0-OpenSSH_3.4p1
Aug  7 11:49:26 dev13 sshd[12319]: debug2: Network child is on pid 12320
Aug  7 11:49:26 dev13 sshd[12319]: debug3: preauth child monitor started
Aug  7 11:49:26 dev13 sshd[12319]: debug3: mm_request_receive entering
Aug  7 11:49:26 dev13 sshd[12319]: debug3: monitor_read: checking
request 0
Aug  7 11:49:26 dev13 sshd[12319]: debug3: mm_answer_moduli: got
parameters: 1024 2048 8192
Aug  7 11:49:26 dev13 sshd[12319]: debug3: mm_request_send entering:
type 1
Aug  7 11:49:26 dev13 sshd[12319]: debug2: monitor_read: 0 used once,
disabling now
Aug  7 11:49:26 dev13 sshd[12319]: debug3: mm_request_receive entering
Aug  7 11:49:27 dev13 sshd[12319]: debug3: monitor_read: checking
request 4
Aug  7 11:49:27 dev13 sshd[12319]: debug3: mm_answer_sign
Aug  7 11:49:27 dev13 sshd[12319]: debug3: mm_answer_sign: signature
0x810e6b0(55)
Aug  7 11:49:27 dev13 sshd[12319]: debug3: mm_request_send entering:
type 5
Aug  7 11:49:27 dev13 sshd[12319]: debug2: monitor_read: 4 used once,
disabling now
Aug  7 11:49:27 dev13 sshd[12319]: debug3: mm_request_receive entering
Aug  7 11:49:27 dev13 sshd[12319]: debug3: monitor_read: checking
request 6
Aug  7 11:49:27 dev13 sshd[12319]: debug3: mm_answer_pwnamallow
Aug  7 11:49:27 dev13 sshd[12319]: debug3: allowed_user: today 11906
sp_expire -1 sp_lstchg 11905 sp_max 99999
Aug  7 11:49:27 dev13 sshd[12319]: debug3: mm_answer_pwnamallow: sending
MONITOR_ANS_PWNAM: 1
Aug  7 11:49:27 dev13 sshd[12319]: debug3: mm_request_send entering:
type 7
Aug  7 11:49:27 dev13 sshd[12319]: debug2: monitor_read: 6 used once,
disabling now
Aug  7 11:49:27 dev13 sshd[12319]: debug3: mm_request_receive entering
Aug  7 11:49:27 dev13 sshd[12319]: debug3: monitor_read: checking
request 3
Aug  7 11:49:27 dev13 sshd[12319]: debug3: mm_answer_authserv:
service=ssh-connection, style=
Aug  7 11:49:27 dev13 sshd[12319]: debug2: monitor_read: 3 used once,
disabling now
Aug  7 11:49:27 dev13 sshd[12319]: debug3: mm_request_receive entering
Aug  7 11:49:27 dev13 sshd[12319]: debug3: monitor_read: checking
request 10
Aug  7 11:49:27 dev13 sshd[12319]: debug3: mm_answer_authpassword:
sending result 0
Aug  7 11:49:27 dev13 sshd[12319]: debug3: mm_request_send entering:
type 11
Aug  7 11:49:27 dev13 sshd[12319]: Failed none for glb from 10.10.0.114
port 2579 ssh2
Aug  7 11:49:27 dev13 sshd[12319]: debug3: mm_request_receive entering
Aug  7 11:49:27 dev13 sshd[12319]: debug3: monitor_read: checking
request 20
Aug  7 11:49:27 dev13 sshd[12319]: debug3: mm_answer_keyallowed entering
Aug  7 11:49:27 dev13 sshd[12319]: debug3: mm_answer_keyallowed:
key_from_blob: 0x810e5b0
Aug  7 11:49:27 dev13 sshd[12319]: debug1: temporarily_use_uid: 522/522
(e=0)
Aug  7 11:49:27 dev13 sshd[12319]: debug1: trying public key file
/home/glb/.ssh/authorized_keys
Aug  7 11:49:27 dev13 sshd[12319]: debug2: key_type_from_name: unknown
key type '1024'
Aug  7 11:49:27 dev13 sshd[12319]: debug3: key_read: no key found
Aug  7 11:49:27 dev13 sshd[12319]: debug2: user_key_allowed: check
options: '1024 35
128595740207060479507856105991669454865404461025581765915492788445768449910817035809257428743309483520830863871414048345249744622395099483967315161082950353293586719060363668584976439640719045510457757912702231439926431435993404972209707408336848979099754395967895610465708167435103384138084697297637267052747 glb at dev14.superstats.com '
Aug  7 11:49:27 dev13 sshd[12319]: debug2: key_type_from_name: unknown
key type '35'
Aug  7 11:49:27 dev13 sshd[12319]: debug3: key_read: no key found
Aug  7 11:49:27 dev13 sshd[12319]: debug2: user_key_allowed: advance:
'35
128595740207060479507856105991669454865404461025581765915492788445768449910817035809257428743309483520830863871414048345249744622395099483967315161082950353293586719060363668584976439640719045510457757912702231439926431435993404972209707408336848979099754395967895610465708167435103384138084697297637267052747 glb at dev14.superstats.com '
Aug  7 11:49:27 dev13 sshd[12319]: debug1: restore_uid
Aug  7 11:49:27 dev13 sshd[12319]: debug2: key not found
Aug  7 11:49:27 dev13 sshd[12319]: debug1: temporarily_use_uid: 522/522
(e=0)
Aug  7 11:49:27 dev13 sshd[12319]: debug1: trying public key file
/home/glb/.ssh/authorized_keys2
Aug  7 11:49:27 dev13 sshd[12319]: debug1: matching key found: file
/home/glb/.ssh/authorized_keys2, line 2
Aug  7 11:49:27 dev13 sshd[12319]: Found matching DSA key:
25:48:a7:14:e6:a0:b6:67:b2:b4:d6:a0:be:b3:98:8b
Aug  7 11:49:27 dev13 sshd[12319]: debug1: restore_uid
Aug  7 11:49:27 dev13 sshd[12319]: debug3: mm_answer_keyallowed: key
0x810e5b0 is allowed
Aug  7 11:49:27 dev13 sshd[12319]: debug3: mm_request_send entering:
type 21
Aug  7 11:49:27 dev13 sshd[12319]: debug3: mm_request_receive entering
Aug  7 11:49:27 dev13 sshd[12319]: debug3: monitor_read: checking
request 20
Aug  7 11:49:27 dev13 sshd[12319]: debug3: mm_answer_keyallowed entering
Aug  7 11:49:27 dev13 sshd[12319]: debug3: mm_answer_keyallowed:
key_from_blob: 0x810e770
Aug  7 11:49:27 dev13 sshd[12319]: debug1: temporarily_use_uid: 522/522
(e=0)
Aug  7 11:49:27 dev13 sshd[12319]: debug1: trying public key file
/home/glb/.ssh/authorized_keys
Aug  7 11:49:27 dev13 sshd[12319]: debug2: key_type_from_name: unknown
key type '1024'
Aug  7 11:49:27 dev13 sshd[12319]: debug3: key_read: no key found
Aug  7 11:49:27 dev13 sshd[12319]: debug2: user_key_allowed: check
options: '1024 35
128595740207060479507856105991669454865404461025581765915492788445768449910817035809257428743309483520830863871414048345249744622395099483967315161082950353293586719060363668584976439640719045510457757912702231439926431435993404972209707408336848979099754395967895610465708167435103384138084697297637267052747 glb at dev14.superstats.com '
Aug  7 11:49:27 dev13 sshd[12319]: debug2: key_type_from_name: unknown
key type '35'
Aug  7 11:49:27 dev13 sshd[12319]: debug3: key_read: no key found
Aug  7 11:49:27 dev13 sshd[12319]: debug2: user_key_allowed: advance:
'35
128595740207060479507856105991669454865404461025581765915492788445768449910817035809257428743309483520830863871414048345249744622395099483967315161082950353293586719060363668584976439640719045510457757912702231439926431435993404972209707408336848979099754395967895610465708167435103384138084697297637267052747 glb at dev14.superstats.com '
Aug  7 11:49:27 dev13 sshd[12319]: debug1: restore_uid
Aug  7 11:49:27 dev13 sshd[12319]: debug2: key not found
Aug  7 11:49:27 dev13 sshd[12319]: debug1: temporarily_use_uid: 522/522
(e=0)
Aug  7 11:49:27 dev13 sshd[12319]: debug1: trying public key file
/home/glb/.ssh/authorized_keys2
Aug  7 11:49:27 dev13 sshd[12319]: debug1: matching key found: file
/home/glb/.ssh/authorized_keys2, line 2
Aug  7 11:49:27 dev13 sshd[12319]: Found matching DSA key:
25:48:a7:14:e6:a0:b6:67:b2:b4:d6:a0:be:b3:98:8b
Aug  7 11:49:27 dev13 sshd[12319]: debug1: restore_uid
Aug  7 11:49:27 dev13 sshd[12319]: debug3: mm_answer_keyallowed: key
0x810e770 is allowed
Aug  7 11:49:27 dev13 sshd[12319]: debug3: mm_request_send entering:
type 21
Aug  7 11:49:27 dev13 sshd[12319]: debug3: mm_request_receive entering
Aug  7 11:49:27 dev13 sshd[12319]: debug3: monitor_read: checking
request 22
Aug  7 11:49:27 dev13 sshd[12319]: debug1: ssh_dss_verify: signature
correct
Aug  7 11:49:27 dev13 sshd[12319]: debug3: mm_answer_keyverify: key
0x810e7a0 signature verified
Aug  7 11:49:27 dev13 sshd[12319]: debug3: mm_request_send entering:
type 23
Aug  7 11:49:27 dev13 sshd[12319]: Accepted publickey for glb from
10.10.0.114 port 2579 ssh2
Aug  7 11:49:27 dev13 sshd[12319]: debug1: monitor_child_preauth: glb
has been authenticated by privileged process
Aug  7 11:49:27 dev13 sshd[12319]: debug3: mm_get_keystate: Waiting for
new keysAug  7 11:49:27 dev13 sshd[12319]: debug3:
mm_request_receive_expect entering: type 24
Aug  7 11:49:27 dev13 sshd[12319]: debug3: mm_request_receive entering
Aug  7 11:49:27 dev13 sshd[12319]: debug3: mm_newkeys_from_blob:
0x810ecf8(118)
Aug  7 11:49:27 dev13 sshd[12319]: debug2: mac_init: found hmac-md5
Aug  7 11:49:27 dev13 sshd[12319]: debug3: mm_get_keystate: Waiting for
second key
Aug  7 11:49:27 dev13 sshd[12319]: debug3: mm_newkeys_from_blob:
0x810ecf8(118)
Aug  7 11:49:28 dev13 sshd[12319]: debug2: mac_init: found hmac-md5
Aug  7 11:49:28 dev13 sshd[12319]: debug3: mm_get_keystate: Getting
compression state
Aug  7 11:49:28 dev13 sshd[12319]: debug3: mm_get_keystate: Getting
Network I/O buffers
Aug  7 11:49:28 dev13 sshd[12319]: debug3: mm_share_sync: Share sync
Aug  7 11:49:28 dev13 sshd[12319]: debug3: mm_share_sync: Share sync end
Aug  7 11:49:28 dev13 sshd[12319]: debug2: User child is on pid 12321
Aug  7 11:49:28 dev13 sshd[12321]: debug1: newkeys: mode 0
Aug  7 11:49:28 dev13 sshd[12319]: debug3: mm_request_receive entering
Aug  7 11:49:28 dev13 sshd[12321]: debug1: newkeys: mode 1
Aug  7 11:49:28 dev13 sshd[12321]: debug1: Entering interactive session
for SSH2.
Aug  7 11:49:28 dev13 sshd[12321]: debug1: fd 5 setting O_NONBLOCK
Aug  7 11:49:28 dev13 sshd[12321]: debug1: fd 6 setting O_NONBLOCK
Aug  7 11:49:28 dev13 sshd[12321]: debug1: server_init_dispatch_20
Aug  7 11:49:28 dev13 sshd[12321]: debug1: server_input_channel_open:
ctype session rchan 0 win 131072 max 32768
Aug  7 11:49:28 dev13 sshd[12321]: debug1: input_session_request
Aug  7 11:49:28 dev13 sshd[12321]: debug1: channel 0: new
[server-session]
Aug  7 11:49:28 dev13 sshd[12321]: debug1: session_new: init
Aug  7 11:49:28 dev13 sshd[12321]: debug1: session_new: session 0
Aug  7 11:49:28 dev13 sshd[12321]: debug1: session_open: channel 0
Aug  7 11:49:28 dev13 sshd[12321]: debug1: session_open: session 0: link
with channel 0
Aug  7 11:49:28 dev13 sshd[12321]: debug1: server_input_channel_open:
confirm session
Aug  7 11:49:28 dev13 sshd[12321]: debug1: server_input_channel_req:
channel 0 request exec reply 0
Aug  7 11:49:28 dev13 sshd[12321]: debug1: session_by_channel: session 0
channel 0
Aug  7 11:49:28 dev13 sshd[12321]: debug1: session_input_channel_req:
session 0 req exec
Aug  7 11:49:28 dev13 sshd[12321]: debug1: fd 8 setting O_NONBLOCK
Aug  7 11:49:28 dev13 sshd[12322]: debug3: channel_close_fds: channel 0:
r -1 w -1 e -1
Aug  7 11:49:28 dev13 sshd[12321]: debug2: fd 8 is O_NONBLOCK
Aug  7 11:49:28 dev13 sshd[12321]: debug1: fd 10 setting O_NONBLOCK
Aug  7 11:49:28 dev13 sshd[12321]: debug1: Received SIGCHLD.
Aug  7 11:49:28 dev13 sshd[12321]: debug1: session_by_pid: pid 12322
Aug  7 11:49:28 dev13 sshd[12321]: debug1: session_exit_message: session
0 channel 0 pid 12322
Aug  7 11:49:28 dev13 sshd[12321]: debug1: channel request 0:
exit-status
Aug  7 11:49:28 dev13 sshd[12321]: debug1: session_exit_message: release
channel 0
Aug  7 11:49:28 dev13 sshd[12321]: debug1: channel 0: write failed
Aug  7 11:49:28 dev13 sshd[12321]: debug1: channel 0: close_write
Aug  7 11:49:28 dev13 sshd[12321]: debug1: channel 0: output open ->
closed
Aug  7 11:49:28 dev13 sshd[12321]: debug1: session_close: session 0 pid
12322
Aug  7 11:49:28 dev13 sshd[12321]: debug1: channel 0: read<=0 rfd 8 len
0
Aug  7 11:49:28 dev13 sshd[12321]: debug1: channel 0: read failed
Aug  7 11:49:28 dev13 sshd[12321]: debug1: channel 0: close_read
Aug  7 11:49:28 dev13 sshd[12321]: debug1: channel 0: input open ->
drain
Aug  7 11:49:28 dev13 sshd[12321]: debug2: channel 0: read 0 from efd 10
Aug  7 11:49:28 dev13 sshd[12321]: debug2: channel 0: closing read-efd
10
Aug  7 11:49:28 dev13 sshd[12321]: debug1: channel 0: ibuf empty
Aug  7 11:49:28 dev13 sshd[12321]: debug1: channel 0: send eof
Aug  7 11:49:28 dev13 sshd[12321]: debug1: channel 0: input drain ->
closed
Aug  7 11:49:28 dev13 sshd[12321]: debug1: channel 0: send close
Aug  7 11:49:28 dev13 sshd[12321]: debug2: notify_done: reading
Aug  7 11:49:28 dev13 sshd[12321]: debug3: channel 0: will not send data
after close
Aug  7 11:49:28 dev13 sshd[12321]: debug1: channel 0: rcvd close
Aug  7 11:49:28 dev13 sshd[12321]: debug3: channel 0: will not send data
after close
Aug  7 11:49:28 dev13 sshd[12321]: debug1: channel 0: is dead
Aug  7 11:49:28 dev13 sshd[12321]: debug1: channel 0: garbage collecting
Aug  7 11:49:28 dev13 sshd[12321]: debug1: channel_free: channel 0:
server-session, nchannels 1
Aug  7 11:49:28 dev13 sshd[12321]: debug3: channel_free: status: The
following connections are open:^M   #0 server-session (t4 r0 i3/0 o3/0
fd 8/8)^M 
Aug  7 11:49:28 dev13 sshd[12321]: debug3: channel_close_fds: channel 0:
r 8 w 8 e -1
Aug  7 11:49:28 dev13 sshd[12321]: Connection closed by remote host.
Aug  7 11:49:28 dev13 sshd[12321]: Closing connection to 10.10.0.114
Aug  7 11:49:28 dev13 sshd[12321]: debug3: mm_request_send entering:
type 38
Aug  7 11:49:28 dev13 sshd[12319]: debug3: monitor_read: checking
request 38
Aug  7 11:49:28 dev13 sshd[12319]: debug3: mm_answer_term: tearing down
sessions

--------------------sshd (ssh cron executed)----------------------

Aug  7 11:49:56 dev13 sshd[12279]: debug1: Forked child 12329.
Aug  7 11:49:56 dev13 sshd[12329]: Connection from 10.10.0.114 port 2581
Aug  7 11:49:56 dev13 sshd[12329]: debug1: Client protocol version 2.0;
client software version OpenSSH_3.4p1
Aug  7 11:49:56 dev13 sshd[12329]: debug1: match: OpenSSH_3.4p1 pat
OpenSSH*
Aug  7 11:49:56 dev13 sshd[12329]: Enabling compatibility mode for
protocol 2.0
Aug  7 11:49:56 dev13 sshd[12329]: debug1: Local version string
SSH-2.0-OpenSSH_3.4p1
Aug  7 11:49:56 dev13 sshd[12329]: debug2: Network child is on pid 12330
Aug  7 11:49:56 dev13 sshd[12329]: debug3: preauth child monitor started
Aug  7 11:49:56 dev13 sshd[12329]: debug3: mm_request_receive entering
Aug  7 11:49:56 dev13 sshd[12329]: debug3: monitor_read: checking
request 0
Aug  7 11:49:56 dev13 sshd[12329]: debug3: mm_answer_moduli: got
parameters: 1024 2048 8192
Aug  7 11:49:56 dev13 sshd[12329]: debug3: mm_request_send entering:
type 1
Aug  7 11:49:56 dev13 sshd[12329]: debug2: monitor_read: 0 used once,
disabling now
Aug  7 11:49:56 dev13 sshd[12329]: debug3: mm_request_receive entering
Aug  7 11:49:57 dev13 sshd[12329]: debug3: monitor_read: checking
request 4
Aug  7 11:49:57 dev13 sshd[12329]: debug3: mm_answer_sign
Aug  7 11:49:57 dev13 sshd[12329]: debug3: mm_answer_sign: signature
0x810e6b0(55)
Aug  7 11:49:57 dev13 sshd[12329]: debug3: mm_request_send entering:
type 5
Aug  7 11:49:57 dev13 sshd[12329]: debug2: monitor_read: 4 used once,
disabling now
Aug  7 11:49:57 dev13 sshd[12329]: debug3: mm_request_receive entering
Aug  7 11:49:57 dev13 sshd[12329]: debug3: monitor_read: checking
request 6
Aug  7 11:49:57 dev13 sshd[12329]: debug3: mm_answer_pwnamallow
Aug  7 11:49:57 dev13 sshd[12329]: debug3: allowed_user: today 11906
sp_expire -1 sp_lstchg 11905 sp_max 99999
Aug  7 11:49:57 dev13 sshd[12329]: debug3: mm_answer_pwnamallow: sending
MONITOR_ANS_PWNAM: 1
Aug  7 11:49:57 dev13 sshd[12329]: debug3: mm_request_send entering:
type 7
Aug  7 11:49:57 dev13 sshd[12329]: debug2: monitor_read: 6 used once,
disabling now
Aug  7 11:49:57 dev13 sshd[12329]: debug3: mm_request_receive entering
Aug  7 11:49:57 dev13 sshd[12329]: debug3: monitor_read: checking
request 3
Aug  7 11:49:57 dev13 sshd[12329]: debug3: mm_answer_authserv:
service=ssh-connection, style=
Aug  7 11:49:57 dev13 sshd[12329]: debug2: monitor_read: 3 used once,
disabling now
Aug  7 11:49:57 dev13 sshd[12329]: debug3: mm_request_receive entering
Aug  7 11:49:57 dev13 sshd[12329]: debug3: monitor_read: checking
request 10
Aug  7 11:49:57 dev13 sshd[12329]: debug3: mm_answer_authpassword:
sending result 0
Aug  7 11:49:57 dev13 sshd[12329]: debug3: mm_request_send entering:
type 11
Aug  7 11:49:57 dev13 sshd[12329]: Failed none for glb from 10.10.0.114
port 2581 ssh2
Aug  7 11:49:57 dev13 sshd[12329]: debug3: mm_request_receive entering
Aug  7 11:49:57 dev13 sshd[12329]: debug3: monitor_read: checking
request 20
Aug  7 11:49:57 dev13 sshd[12329]: debug3: mm_answer_keyallowed entering
Aug  7 11:49:57 dev13 sshd[12329]: debug3: mm_answer_keyallowed:
key_from_blob: 0x810e5b0
Aug  7 11:49:57 dev13 sshd[12329]: debug1: temporarily_use_uid: 522/522
(e=0)
Aug  7 11:49:57 dev13 sshd[12329]: debug1: trying public key file
/home/glb/.ssh/authorized_keys
Aug  7 11:49:57 dev13 sshd[12329]: debug2: key_type_from_name: unknown
key type '1024'
Aug  7 11:49:57 dev13 sshd[12329]: debug3: key_read: no key found
Aug  7 11:49:57 dev13 sshd[12329]: debug2: user_key_allowed: check
options: '1024 35
128595740207060479507856105991669454865404461025581765915492788445768449910817035809257428743309483520830863871414048345249744622395099483967315161082950353293586719060363668584976439640719045510457757912702231439926431435993404972209707408336848979099754395967895610465708167435103384138084697297637267052747 glb at dev14.superstats.com '
Aug  7 11:49:57 dev13 sshd[12329]: debug2: key_type_from_name: unknown
key type '35'
Aug  7 11:49:57 dev13 sshd[12329]: debug3: key_read: no key found
Aug  7 11:49:57 dev13 sshd[12329]: debug2: user_key_allowed: advance:
'35
128595740207060479507856105991669454865404461025581765915492788445768449910817035809257428743309483520830863871414048345249744622395099483967315161082950353293586719060363668584976439640719045510457757912702231439926431435993404972209707408336848979099754395967895610465708167435103384138084697297637267052747 glb at dev14.superstats.com '
Aug  7 11:49:57 dev13 sshd[12329]: debug1: restore_uid
Aug  7 11:49:57 dev13 sshd[12329]: debug2: key not found
Aug  7 11:49:57 dev13 sshd[12329]: debug1: temporarily_use_uid: 522/522
(e=0)
Aug  7 11:49:57 dev13 sshd[12329]: debug1: trying public key file
/home/glb/.ssh/authorized_keys2
Aug  7 11:49:57 dev13 sshd[12329]: debug1: matching key found: file
/home/glb/.ssh/authorized_keys2, line 2
Aug  7 11:49:57 dev13 sshd[12329]: Found matching DSA key:
25:48:a7:14:e6:a0:b6:67:b2:b4:d6:a0:be:b3:98:8b
Aug  7 11:49:57 dev13 sshd[12329]: debug1: restore_uid
Aug  7 11:49:57 dev13 sshd[12329]: debug3: mm_answer_keyallowed: key
0x810e5b0 is allowed
Aug  7 11:49:57 dev13 sshd[12329]: debug3: mm_request_send entering:
type 21
Aug  7 11:49:57 dev13 sshd[12329]: debug3: mm_request_receive entering
Aug  7 11:49:57 dev13 sshd[12329]: debug3: monitor_read: checking
request 20
Aug  7 11:49:57 dev13 sshd[12329]: debug3: mm_answer_keyallowed entering
Aug  7 11:49:57 dev13 sshd[12329]: debug3: mm_answer_keyallowed:
key_from_blob: 0x810e770
Aug  7 11:49:57 dev13 sshd[12329]: debug1: temporarily_use_uid: 522/522
(e=0)
Aug  7 11:49:57 dev13 sshd[12329]: debug1: trying public key file
/home/glb/.ssh/authorized_keys
Aug  7 11:49:57 dev13 sshd[12329]: debug2: key_type_from_name: unknown
key type '1024'
Aug  7 11:49:57 dev13 sshd[12329]: debug3: key_read: no key found
Aug  7 11:49:57 dev13 sshd[12329]: debug2: user_key_allowed: check
options: '1024 35
128595740207060479507856105991669454865404461025581765915492788445768449910817035809257428743309483520830863871414048345249744622395099483967315161082950353293586719060363668584976439640719045510457757912702231439926431435993404972209707408336848979099754395967895610465708167435103384138084697297637267052747 glb at dev14.superstats.com '
Aug  7 11:49:57 dev13 sshd[12329]: debug2: key_type_from_name: unknown
key type '35'
Aug  7 11:49:57 dev13 sshd[12329]: debug3: key_read: no key found
Aug  7 11:49:57 dev13 sshd[12329]: debug2: user_key_allowed: advance:
'35
128595740207060479507856105991669454865404461025581765915492788445768449910817035809257428743309483520830863871414048345249744622395099483967315161082950353293586719060363668584976439640719045510457757912702231439926431435993404972209707408336848979099754395967895610465708167435103384138084697297637267052747 glb at dev14.superstats.com '
Aug  7 11:49:57 dev13 sshd[12329]: debug1: restore_uid
Aug  7 11:49:57 dev13 sshd[12329]: debug2: key not found
Aug  7 11:49:57 dev13 sshd[12329]: debug1: temporarily_use_uid: 522/522
(e=0)
Aug  7 11:49:57 dev13 sshd[12329]: debug1: trying public key file
/home/glb/.ssh/authorized_keys2
Aug  7 11:49:57 dev13 sshd[12329]: debug1: matching key found: file
/home/glb/.ssh/authorized_keys2, line 2
Aug  7 11:49:57 dev13 sshd[12329]: Found matching DSA key:
25:48:a7:14:e6:a0:b6:67:b2:b4:d6:a0:be:b3:98:8b
Aug  7 11:49:57 dev13 sshd[12329]: debug1: restore_uid
Aug  7 11:49:57 dev13 sshd[12329]: debug3: mm_answer_keyallowed: key
0x810e770 is allowed
Aug  7 11:49:57 dev13 sshd[12329]: debug3: mm_request_send entering:
type 21
Aug  7 11:49:57 dev13 sshd[12329]: debug3: mm_request_receive entering
Aug  7 11:49:57 dev13 sshd[12329]: debug3: monitor_read: checking
request 22
Aug  7 11:49:57 dev13 sshd[12329]: debug1: ssh_dss_verify: signature
correct
Aug  7 11:49:57 dev13 sshd[12329]: debug3: mm_answer_keyverify: key
0x810e7a0 signature verified
Aug  7 11:49:57 dev13 sshd[12329]: debug3: mm_request_send entering:
type 23
Aug  7 11:49:57 dev13 sshd[12329]: Accepted publickey for glb from
10.10.0.114 port 2581 ssh2
Aug  7 11:49:57 dev13 sshd[12329]: debug1: monitor_child_preauth: glb
has been authenticated by privileged process
Aug  7 11:49:57 dev13 sshd[12329]: debug3: mm_get_keystate: Waiting for
new keysAug  7 11:49:57 dev13 sshd[12329]: debug3:
mm_request_receive_expect entering: type 24
Aug  7 11:49:57 dev13 sshd[12329]: debug3: mm_request_receive entering
Aug  7 11:49:57 dev13 sshd[12329]: debug3: mm_newkeys_from_blob:
0x810ecf8(118)
Aug  7 11:49:57 dev13 sshd[12329]: debug2: mac_init: found hmac-md5
Aug  7 11:49:57 dev13 sshd[12329]: debug3: mm_get_keystate: Waiting for
second key
Aug  7 11:49:57 dev13 sshd[12329]: debug3: mm_newkeys_from_blob:
0x810ecf8(118)
Aug  7 11:49:57 dev13 sshd[12329]: debug2: mac_init: found hmac-md5
Aug  7 11:49:57 dev13 sshd[12329]: debug3: mm_get_keystate: Getting
compression state
Aug  7 11:49:57 dev13 sshd[12329]: debug3: mm_get_keystate: Getting
Network I/O buffers
Aug  7 11:49:57 dev13 sshd[12329]: debug3: mm_share_sync: Share sync
Aug  7 11:49:57 dev13 sshd[12329]: debug3: mm_share_sync: Share sync end
Aug  7 11:49:57 dev13 sshd[12329]: debug2: User child is on pid 12331
Aug  7 11:49:57 dev13 sshd[12331]: debug1: newkeys: mode 0
Aug  7 11:49:57 dev13 sshd[12329]: debug3: mm_request_receive entering
Aug  7 11:49:57 dev13 sshd[12331]: debug1: newkeys: mode 1
Aug  7 11:49:58 dev13 sshd[12331]: debug1: Entering interactive session
for SSH2.
Aug  7 11:49:58 dev13 sshd[12331]: debug1: fd 5 setting O_NONBLOCK
Aug  7 11:49:58 dev13 sshd[12331]: debug1: fd 6 setting O_NONBLOCK
Aug  7 11:49:58 dev13 sshd[12331]: debug1: server_init_dispatch_20
Aug  7 11:49:58 dev13 sshd[12331]: debug1: server_input_channel_open:
ctype session rchan 0 win 131072 max 32768
Aug  7 11:49:58 dev13 sshd[12331]: debug1: input_session_request
Aug  7 11:49:58 dev13 sshd[12331]: debug1: channel 0: new
[server-session]
Aug  7 11:49:58 dev13 sshd[12331]: debug1: session_new: init
Aug  7 11:49:58 dev13 sshd[12331]: debug1: session_new: session 0
Aug  7 11:49:58 dev13 sshd[12331]: debug1: session_open: channel 0
Aug  7 11:49:58 dev13 sshd[12331]: debug1: session_open: session 0: link
with channel 0
Aug  7 11:49:58 dev13 sshd[12331]: debug1: server_input_channel_open:
confirm session
Aug  7 11:49:58 dev13 sshd[12331]: debug1: server_input_channel_req:
channel 0 request exec reply 0
Aug  7 11:49:58 dev13 sshd[12331]: debug1: session_by_channel: session 0
channel 0
Aug  7 11:49:58 dev13 sshd[12331]: debug1: session_input_channel_req:
session 0 req exec
Aug  7 11:49:58 dev13 sshd[12331]: debug1: fd 8 setting O_NONBLOCK
Aug  7 11:49:58 dev13 sshd[12332]: debug3: channel_close_fds: channel 0:
r -1 w -1 e -1
Aug  7 11:49:58 dev13 sshd[12331]: debug2: fd 8 is O_NONBLOCK
Aug  7 11:49:58 dev13 sshd[12331]: debug1: fd 10 setting O_NONBLOCK
Aug  7 11:49:58 dev13 sshd[12331]: debug1: Received SIGCHLD.
Aug  7 11:49:58 dev13 sshd[12331]: debug1: channel 0: output open ->
drain
Aug  7 11:49:58 dev13 sshd[12331]: debug1: channel 0: obuf empty
Aug  7 11:49:58 dev13 sshd[12331]: debug1: channel 0: close_write
Aug  7 11:49:58 dev13 sshd[12331]: debug1: channel 0: output drain ->
closed
Aug  7 11:49:58 dev13 sshd[12331]: debug2: notify_done: reading
Aug  7 11:49:58 dev13 sshd[12331]: debug1: session_by_pid: pid 12332
Aug  7 11:49:58 dev13 sshd[12331]: debug1: session_exit_message: session
0 channel 0 pid 12332
Aug  7 11:49:58 dev13 sshd[12331]: debug1: channel request 0:
exit-status
Aug  7 11:49:58 dev13 sshd[12331]: debug1: session_exit_message: release
channel 0
Aug  7 11:49:58 dev13 sshd[12331]: debug1: session_close: session 0 pid
12332
Aug  7 11:49:58 dev13 sshd[12331]: debug2: channel 0: read 0 from efd 10
Aug  7 11:49:58 dev13 sshd[12331]: debug2: channel 0: closing read-efd
10
Aug  7 11:49:58 dev13 sshd[12331]: debug1: channel 0: read<=0 rfd 8 len
0
Aug  7 11:49:58 dev13 sshd[12331]: debug1: channel 0: read failed
Aug  7 11:49:58 dev13 sshd[12331]: debug1: channel 0: close_read
Aug  7 11:49:58 dev13 sshd[12331]: debug1: channel 0: input open ->
drain
Aug  7 11:49:58 dev13 sshd[12331]: debug1: channel 0: ibuf empty
Aug  7 11:49:58 dev13 sshd[12331]: debug1: channel 0: send eof
Aug  7 11:49:58 dev13 sshd[12331]: debug1: channel 0: input drain ->
closed
Aug  7 11:49:58 dev13 sshd[12331]: debug1: channel 0: send close
Aug  7 11:49:58 dev13 sshd[12331]: debug3: channel 0: will not send data
after close
Aug  7 11:50:18 dev13 last message repeated 198 times
Aug  7 11:50:18 dev13 sshd[12331]: Connection closed by remote host.
Aug  7 11:50:18 dev13 sshd[12331]: debug1: channel_free: channel 0:
server-session, nchannels 1
Aug  7 11:50:18 dev13 sshd[12331]: debug3: channel_free: status: The
following connections are open:^M   #0 server-session (t4 r0 i3/0 o3/0
fd 8/8)^M 
Aug  7 11:50:18 dev13 sshd[12331]: debug3: channel_close_fds: channel 0:
r 8 w 8 e -1
Aug  7 11:50:18 dev13 sshd[12331]: Closing connection to 10.10.0.114
Aug  7 11:50:18 dev13 sshd[12331]: debug3: mm_request_send entering:
type 38
Aug  7 11:50:18 dev13 sshd[12329]: debug3: monitor_read: checking
request 38
Aug  7 11:50:18 dev13 sshd[12329]: debug3: mm_answer_term: tearing down
sessions

On Wed, 2002-08-07 at 11:17, Nicolas.Williams at ubsw.com wrote:
> 
> "ssh -n ..." means ssh will close stdin and open /dev/null for stdin. It does not mean losing th eoutput of ssh.
> 
> Nico
> -- 
> 




More information about the openssh-unix-dev mailing list