Testing Call: OK HP-UX 11.00
Darren Tucker
dtucker at zip.com.au
Sun Jul 21 10:56:49 EST 2002
Kevin Steves wrote:
> On Sat, Jul 20, 2002 at 10:25:32PM +1000, Darren Tucker wrote:
[64-bit ssh/sshd on HP-UX 11.00 doesn't work]
>
> And it's generally recommended that apps be 32-bit, unless there
> are specific reasons to be 64-bit.
I thought that was the case. I mentioned it only because it might be a
symptom of some other problem and I don't know enough to tell.
The problem I see is not the one you referred to. Sshd will go to 100%
cpu and do nothing else. Ssh does the following (talking to an otherwise
working 32-bit sshd).
If this is worth pursuing, let me know and I'll open a bugzilla bug,
otherwise I'll consider the matter closed.
-Daz.
# file ssh
ssh: ELF-64 executable object file - PA-RISC 2.0 (LP64)
# ./ssh -v localhost
OpenSSH_3.4p1, SSH protocols 1.5/2.0, OpenSSL 0x0090604f
debug1: Reading configuration data /usr/local/etc/ssh_config
debug1: Rhosts Authentication disabled, originating port will not be
trusted.
debug1: ssh_connect: needpriv 0
debug1: Connecting to localhost [0.0.0.0] port 22.
debug1: Connection established.
debug1: identity file /.ssh/identity type -1
debug1: identity file /.ssh/id_rsa type -1
debug1: identity file /.ssh/id_dsa type -1
debug1: Remote protocol version 1.99, remote software version
OpenSSH_3.4p1
debug1: match: OpenSSH_3.4p1 pat OpenSSH*
Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_3.4p1
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug1: kex: server->client aes128-cbc hmac-md5 none
debug1: kex: client->server aes128-cbc hmac-md5 none
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
debug1: dh_gen_key: priv key bits set: 127/256
debug1: bits set: 0/3191
invalid public DH value (0/3191)
debug1: dh_gen_key: priv key bits set: 238/256
debug1: bits set: 0/3191
invalid public DH value (0/3191)
debug1: dh_gen_key: priv key bits set: 355/256
debug1: bits set: 0/3191
invalid public DH value (0/3191)
debug1: dh_gen_key: priv key bits set: 481/256
debug1: bits set: 0/3191
invalid public DH value (0/3191)
debug1: dh_gen_key: priv key bits set: 601/256
debug1: bits set: 0/3191
invalid public DH value (0/3191)
debug1: dh_gen_key: priv key bits set: 740/256
debug1: bits set: 0/3191
invalid public DH value (0/3191)
debug1: dh_gen_key: priv key bits set: 857/256
debug1: bits set: 0/3191
invalid public DH value (0/3191)
debug1: dh_gen_key: priv key bits set: 986/256
debug1: bits set: 0/3191
invalid public DH value (0/3191)
debug1: dh_gen_key: priv key bits set: 1123/256
debug1: bits set: 0/3191
invalid public DH value (0/3191)
debug1: dh_gen_key: priv key bits set: 1250/256
debug1: bits set: 0/3191
invalid public DH value (0/3191)
debug1: dh_gen_key: priv key bits set: 1371/256
debug1: bits set: 0/3191
invalid public DH value (0/3191)
debug1: dh_gen_key: priv key bits set: 1487/256
dh_gen_key: too many bad keys: giving up
debug1: Calling cleanup 0x8000000000021b08(0x0)
--
Darren Tucker (dtucker at zip.com.au)
GPG Fingerprint D9A3 86E9 7EEE AF4B B2D4 37C9 C982 80C7 8FF4 FA69
Good judgement comes with experience. Unfortunately, the experience
usually comes from bad judgement.
More information about the openssh-unix-dev
mailing list