bad owner on /var/empty: RH6.2 sparc 3.4p1

Bob Van Cleef vancleef at microunity.com
Thu Jun 27 06:06:05 EST 2002


On Wed, 26 Jun 2002, Tim Rice wrote:

> 
> chown root:root /var/empty

Thank you = that fixed the problem.  

So, for the record, sparc linux RH 6.2 works....  Thank you all!



> > Linux ns1 2.2.14-5.0 #1 Tue Mar 7 20:54:26 EST 2000 sparc unknown


[root at ns1 openssh-3.4p1]# /usr/local/sbin/sshd -d
This platform does not support both privilege separation and compression
Compression disabled
debug1: sshd version OpenSSH_3.4p1
debug1: private host key: #0 type 0 RSA1
debug1: read PEM private key done: type RSA
debug1: private host key: #1 type 1 RSA
debug1: read PEM private key done: type DSA
debug1: private host key: #2 type 2 DSA
socket: Invalid argument
debug1: Bind to port 22 on 0.0.0.0.
Server listening on 0.0.0.0 port 22.
Generating 768 bit RSA key.
RSA key generation complete.
debug1: Server will not fork when running in debugging mode.
Connection from 192.86.6.8 port 1476
debug1: Client protocol version 1.5; client software version 1.2.25
debug1: match: 1.2.25 pat 1.2.1*,1.2.2*,1.2.3*
debug1: Local version string SSH-1.99-OpenSSH_3.4p1
debug1: Sent 768 bit server key and 1024 bit host key.
debug1: Encryption type: 3des
debug1: cipher_init: set keylen (16 -> 32)
debug1: cipher_init: set keylen (16 -> 32)
debug1: Received session key; encryption turned on.
debug1: Installing crc compensation attack detector.
debug1: Attempting authentication for vancleef.
debug1: Starting up PAM with username "vancleef"
debug1: PAM setting rhost to "pan-6.microunity.com"
debug1: PAM Password authentication for "vancleef" failed[7]: 
Authentication failure
Failed none for vancleef from 192.86.6.8 port 1476
debug1: temporarily_use_uid: 500/500 (e=0)
debug1: trying public RSA key file /home/vancleef/.ssh/authorized_keys
debug1: restore_uid
Failed rsa for vancleef from 192.86.6.8 port 1476
debug1: PAM Password authentication accepted for user "vancleef"
Accepted password for vancleef from 192.86.6.8 port 1476
Accepted password for vancleef from 192.86.6.8 port 1476
debug1: monitor_child_preauth: vancleef has been authenticated by 
privileged process
debug1: PAM establishing creds
debug1: cipher_init: set keylen (16 -> 32)
debug1: cipher_init: set keylen (16 -> 32)
debug1: session_new: init
debug1: session_new: session 0
debug1: Installing crc compensation attack detector.
debug1: Allocating pty.
debug1: session_new: init
debug1: session_new: session 0
debug1: session_pty_req: session 0 alloc /dev/pts/3
debug1: Ignoring unsupported tty mode opcode 16 (0x10)
debug1: Ignoring unsupported tty mode opcode 17 (0x11)
Setting tty modes failed: Invalid argument
debug1: PAM setting tty to "/dev/pts/3"
debug1: PAM establishing creds
debug1: fd 4 setting TCP_NODELAY
debug1: Entering interactive session.
debug1: Setting controlling tty using TIOCSCTTY.
debug1: fd 7 setting O_NONBLOCK
debug1: fd 10 setting O_NONBLOCK
debug1: fd 11 setting O_NONBLOCK
debug1: server_init_dispatch_13
debug1: server_init_dispatch_15
debug1: Received SIGCHLD.
debug1: End of interactive session; stdin 5, stdout (read 781, sent 781), 
stderr 0 bytes.
debug1: Command exited with status 0.
debug1: Received exit confirmation.
debug1: session_close: session 0 pid 6665
debug1: session_by_tty: session 0 tty /dev/pts/3
debug1: session_pty_cleanup: session 0 release /dev/pts/3
Closing connection to 192.86.6.8
[root at ns1 openssh-3.4p1]#






More information about the openssh-unix-dev mailing list