[Bug 296] Priv separation does not work on OSF/1

bugzilla-daemon at mindrot.org bugzilla-daemon at mindrot.org
Wed Jun 26 02:54:29 EST 2002


http://bugzilla.mindrot.org/show_bug.cgi?id=296





------- Additional Comments From jss at ast.cam.ac.uk  2002-06-26 02:54 -------
I get this too with 4.0F and SSH1. I can log into the server as root (as long as
root logins are allowed), but with privsep on I can't log in as other users. The
connection just gets closed.

Debug ssh client:
OpenSSH_3.3, SSH protocols 1.5/2.0, OpenSSL 0x0090602f
debug1: Reading configuration data /home/jss/.ssh/config
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: Applying options for *
debug1: Rhosts Authentication disabled, originating port will not be trusted.
debug1: ssh_connect: needpriv 0
debug1: Connecting to xalph2 [131.111.68.136] port 22.
debug1: Connection established.
debug1: identity file /home/jss/.ssh/identity type 0
debug1: identity file /home/jss/.ssh/id_rsa type -1
debug1: identity file /home/jss/.ssh/id_dsa type 2
debug1: Remote protocol version 1.99, remote software version OpenSSH_3.3
debug1: match: OpenSSH_3.3 pat OpenSSH*
debug1: Local version string SSH-1.5-OpenSSH_3.3
debug1: Waiting for server public key.
debug1: Received server public key (768 bits) and host key (1024 bits).
debug1: Host 'xalph2' is known and matches the RSA1 host key.
debug1: Found key in /etc/ssh/ssh_known_hosts:150
debug1: Encryption type: blowfish
debug1: Sent encrypted session key.
debug1: Installing crc compensation attack detector.
debug1: Received encrypted confirmation.
debug1: Trying RSA authentication with key '/home/jss/.ssh/identity'
debug1: Received RSA challenge from server.
debug1: Sending response to host key RSA challenge.
debug1: Remote: RSA authentication accepted.
debug1: RSA authentication accepted by server.
debug1: Requesting pty.
debug1: Requesting X11 forwarding with authentication spoofing.
debug1: fd 3 setting TCP_NODELAY
debug1: Requesting shell.
debug1: Entering interactive session.
Connection to xalph2 closed by remote host.
Connection to xalph2 closed.
debug1: Transferred: stdin 0, stdout 0, stderr 75 bytes in 0.0 seconds
debug1: Bytes per second: stdin 0.0, stdout 0.0, stderr 15191.4
debug1: Exit status -1

On the server:
[root at xalph2 /var]# /usr/sbin/sshd -d
debug1: sshd version OpenSSH_3.3
debug1: private host key: #0 type 0 RSA1
debug1: read PEM private key done: type RSA
debug1: private host key: #1 type 1 RSA
debug1: read PEM private key done: type DSA
debug1: private host key: #2 type 2 DSA
debug1: Bind to port 22 on 0.0.0.0.
Server listening on 0.0.0.0 port 22.
Generating 768 bit RSA key.
RSA key generation complete.
debug1: Server will not fork when running in debugging mode.
Connection from 131.111.68.219 port 33065
debug1: Client protocol version 1.5; client software version OpenSSH_3.3
debug1: match: OpenSSH_3.3 pat OpenSSH*
debug1: Local version string SSH-1.99-OpenSSH_3.3
debug1: Rhosts Authentication disabled, originating port 33065 not trusted.
debug1: Sent 768 bit server key and 1024 bit host key.
debug1: Encryption type: blowfish
debug1: Received session key; encryption turned on.
debug1: Installing crc compensation attack detector.
debug1: Attempting authentication for jss.
Failed none for jss from 131.111.68.219 port 33065
debug1: temporarily_use_uid: 914/15 (e=0)
debug1: trying public RSA key file /home/jss/.ssh/authorized_keys
debug1: restore_uid
Accepted rsa for jss from 131.111.68.219 port 33065
debug1: : jss has been authenticated by privileged process
Found matching RSA1 key: d3:a3:b2:69:3e:e8:db:21:9a:8d:d0:83:ea:d4:e4:b4
Accepted rsa for jss from 131.111.68.219 port 33065
debug1: session_new: init
debug1: session_new: session 0
debug1: Installing crc compensation attack detector.
debug1: Allocating pty.
debug1: session_new: init
debug1: session_new: session 0
debug1: session_pty_req: session 0 alloc /dev/ttyp3
debug1: bind port 6010: Address already in use
debug1: bind port 6011: Address already in use
debug1: bind port 6012: Address already in use
debug1: fd 10 setting O_NONBLOCK
debug1: channel 0: new [X11 inet listener]
debug1: fd 4 setting TCP_NODELAY
debug1: Entering interactive session.
debug1: fd 7 setting O_NONBLOCK
debug1: fd 12 setting O_NONBLOCK
debug1: fd 13 setting O_NONBLOCK
debug1: server_init_dispatch_13
debug1: server_init_dispatch_15
debug1: Setting controlling tty using TIOCSCTTY.
debug1: session_by_tty: session 0 tty /dev/ttyp3
debug1: session_pty_cleanup: session 0 release /dev/ttyp3
Connection closed by remote host.
debug1: Calling cleanup 0x120064bcc(0x0)
debug1: channel_free: channel 0: X11 inet listener, nchannels 1
debug1: Calling cleanup 0x12004fab0(0x140030ce8)
debug1: Calling cleanup 0x120056f50(0x0)
: unpermitted request 27
debug1: Calling cleanup 0x120056f50(0x0)

In /var/adm/syslogs.dated/current:
Jun 25 17:46:41 xalph2 sshd[13114]: Accepted rsa for jss from 131.111.68.219
port 33087
Jun 25 17:46:42 xalph2 sshd[13120]: audgen(LOGIN): Permission denied
Jun 25 17:46:42 xalph2 sshd[13120]: fatal: Couldn't establish session for jss
from xpc1.ast.cam.ac.uk
Jun 25 17:46:43 xalph2 sshd[13109]: fatal: : unpermitted request 27
Jun 25 17:46:52 xalph2 sshd[13114]: fatal: : unpermitted request 27



------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.



More information about the openssh-unix-dev mailing list