Build bug and execution bug

Darren Tucker dtucker at zip.com.au
Tue Jul 1 07:45:43 EST 2008


On Tue, Jul 1, 2008 at 2:01 AM, Bruce Korb <bruce.korb at gmail.com> wrote:
> The build bug:  DESTDIR=$SOMEDIR does not work:
>
> mkdir ${HOME}/tools/openssh/openssh-5.0p1/_i/usr/local/etc
> ${HOME}/tools/openssh/openssh-5.0p1/_i/usr/local/sbin/sshd -t -f
> ${HOME}/tools/openssh/openssh-5.0p1/_i/usr/local/etc/sshd_config
> Could not load host key: /usr/local/etc/ssh_host_rsa_key
> Could not load host key: /usr/local/etc/ssh_host_dsa_key
> Disabling protocol version 2. Could not load host key
> sshd: no hostkeys available -- exiting.
> make: [check-config] Error 1 (ignored)

That looks like the install worked but the "sshd -t" test failed
because sshd did not have permission to read the keys that it's
configured to use (via --prefix or --sysconfdir as Ben mentioned).
Try "make install-nokeys DESTDIR=foo" instead.

[...]
> It works with my client side daemon running 0.9.8c and 0.9.8e
> (as reported by "ssh", not "sshd"), but not with 0.9.8g.

Those are versions of the OpenSSL library that OpenSSH uses.  What are
the versions of ssh and sshd?

> On the server side, I invoke:
>
> /usr/bin/ssh -v -q -g -R ${PORT}:localhost:22 -n \
>  -o BatchMode=yes -o StrictHostKeyChecking=no <home-mach>

The output of this command would be interesting (particularly with
"-vvv") to see if the remote forwarding request was actually accepted
by the server.  You could also add "-o ExitOnForwardFailure=yes" to
make sure that the tunnel is established.

> The only user allowed to ssh in has a shell that does nothing except
> keep the connection open.
[...]

My guess is that the server (ie the thing running sshd) has
"AllowTcpForwarding no" in its sshd_config.

-- 
Darren Tucker (dtucker at zip.com.au)
GPG key 8FF4FA69 / D9A3 86E9 7EEE AF4B B2D4 37C9 C982 80C7 8FF4 FA69
 Good judgement comes with experience. Unfortunately, the experience
usually comes from bad judgement.


More information about the openssh-unix-dev mailing list