Possible issue with stdio forwarding

Iain Morgan imorgan at nas.nasa.gov
Fri Jan 29 06:15:46 EST 2010


Greetings,

I've been doing a little testing with the stdio forwarding support added
in recent snapshots and have encountered one possible issue. First, I
should say that this feature generally seems to work. However, I haven't
been able to get it to work when connecting to a server running
SSH.COM's product.

The config file I am using is fairly simple:

Host sfe1
	LogLevel		debug3

Host cfe?
	ProxyCommand		ssh -W %h:%p sfe1

Host *
	HostbasedAuthentication	no

If I connect to the bastion, sfe1, and request TCP port forwarding a la
-L 2122:cfe1:22, I am able to successfully connect to cfe1 via the
forwarded port. However, if I use stdio forwarding as indicated in the
config file above, the connection fails.

Given that the server allows TCP forwarding of the desired port, I had
expected that stdio forwarding would likewise work. The stdio forwarding
apporach does work if the intermediate server is running OpenSSH, even a
somewhat dated version. So I'm suspecting it is a quirk with the SSH.COM
server.

Here's the debug3 output from the proxy command attempting to do the
stdio forwarding.

debug2: ssh_connect: needpriv 0
debug1: Connecting to sfe1 [129.99.242.1] port 22.
debug1: Connection established.
debug1: could not open key file '/etc/ssh/ssh_host_key': Permission denied
debug1: could not open key file '/etc/ssh/ssh_host_dsa_key': Permission denied
debug1: could not open key file '/etc/ssh/ssh_host_rsa_key': Permission denied
debug1: identity file /u/wk/imorgan/.ssh/identity type -1
debug3: Not a RSA1 key file /u/wk/imorgan/.ssh/id_rsa.
debug2: key_type_from_name: unknown key type '-----BEGIN'
debug3: key_read: missing keytype
debug2: key_type_from_name: unknown key type 'Proc-Type:'
debug3: key_read: missing keytype
debug2: key_type_from_name: unknown key type 'DEK-Info:'
debug3: key_read: missing keytype
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug2: key_type_from_name: unknown key type '-----END'
debug3: key_read: missing keytype
debug1: identity file /u/wk/imorgan/.ssh/id_rsa type 1
debug1: identity file /u/wk/imorgan/.ssh/id_dsa type -1
debug1: Remote protocol version 2.0, remote software version 6.0.6.19 SSH Tectia Server
debug1: no match: 6.0.6.19 SSH Tectia Server
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_5.3
debug2: fd 3 setting O_NONBLOCK
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
debug2: kex_parse_kexinit: arcfour,blowfish-cbc,cast128-cbc,aes128-cbc,3des-cbc
debug2: kex_parse_kexinit: arcfour,blowfish-cbc,cast128-cbc,aes128-cbc,3des-cbc
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64 at openssh.com,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64 at openssh.com,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none,zlib at openssh.com,zlib
debug2: kex_parse_kexinit: none,zlib at openssh.com,zlib
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: first_kex_follows 0 
debug2: kex_parse_kexinit: reserved 0 
debug2: kex_parse_kexinit: diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa
debug2: kex_parse_kexinit: aes128-cbc,aes192-cbc,aes256-cbc,3des-cbc
debug2: kex_parse_kexinit: aes128-cbc,aes192-cbc,aes256-cbc,3des-cbc
debug2: kex_parse_kexinit: hmac-sha1
debug2: kex_parse_kexinit: hmac-sha1
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: first_kex_follows 0 
debug2: kex_parse_kexinit: reserved 0 
debug2: mac_setup: found hmac-sha1
debug1: kex: server->client aes128-cbc hmac-sha1 none
debug2: mac_setup: found hmac-sha1
debug1: kex: client->server aes128-cbc hmac-sha1 none
debug2: dh_gen_key: priv key bits set: 159/320
debug2: bits set: 516/1024
debug1: sending SSH2_MSG_KEXDH_INIT
debug1: expecting SSH2_MSG_KEXDH_REPLY
debug3: check_host_in_hostfile: host sfe1 filename /u/wk/imorgan/.ssh/known_hosts
debug3: check_host_in_hostfile: host sfe1 filename /etc/ssh/ssh_known_hosts
debug3: check_host_in_hostfile: match line 896
debug3: check_host_in_hostfile: host 129.99.242.1 filename /u/wk/imorgan/.ssh/known_hosts
debug3: check_host_in_hostfile: host 129.99.242.1 filename /etc/ssh/ssh_known_hosts
debug3: check_host_in_hostfile: match line 896
debug1: Host 'sfe1' is known and matches the RSA host key.
debug1: Found key in /etc/ssh/ssh_known_hosts:896
debug2: bits set: 528/1024
debug1: ssh_rsa_verify: signature correct
debug2: kex_derive_keys
debug2: set_newkeys: mode 1
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug2: set_newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: Roaming not allowed by server
debug1: SSH2_MSG_SERVICE_REQUEST sent
debug3: Received SSH2_MSG_IGNORE
debug3: Received SSH2_MSG_IGNORE
debug2: service_accept: ssh-userauth
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug2: key: /u/wk/imorgan/.ssh/id_rsa (0x1be0780)
debug2: key: /u/wk/imorgan/.ssh/identity ((nil))
debug2: key: /u/wk/imorgan/.ssh/id_dsa ((nil))
debug3: Received SSH2_MSG_IGNORE
debug3: input_userauth_banner
----------------------------------------------------------------

WARNING! This is a US Government computer. This system is for
the use of authorized users only. By accessing and using the
computer system you are consenting to system monitoring,
including the monitoring of keystrokes. Unauthorized use of, or
access to, this computer system may subject you to disciplinary
action and criminal prosecution.

----------------------------------------------------------------
debug3: Received SSH2_MSG_IGNORE
debug1: Authentications that can continue: keyboard-interactive
debug3: start over, passed a different list keyboard-interactive
debug3: preferred publickey,keyboard-interactive,password
debug3: authmethod_lookup keyboard-interactive
debug3: remaining preferred: password
debug3: authmethod_is_enabled keyboard-interactive
debug1: Next authentication method: keyboard-interactive
debug2: userauth_kbdint
debug2: we sent a keyboard-interactive packet, wait for reply
debug3: Received SSH2_MSG_IGNORE
debug2: input_userauth_info_req
PAM Authentication
debug2: input_userauth_info_req: num_prompts 1
debug3: packet_send2: adding 32 (len 26 padlen 6 extra_pad 64)
debug3: Received SSH2_MSG_IGNORE
Authenticated with partial success.
debug1: Authentications that can continue: password,publickey
debug3: start over, passed a different list password,publickey
debug3: preferred publickey,keyboard-interactive,password
debug3: authmethod_lookup publickey
debug3: remaining preferred: keyboard-interactive,password
debug3: authmethod_is_enabled publickey
debug1: Next authentication method: publickey
debug1: Offering public key: /u/wk/imorgan/.ssh/id_rsa
debug3: send_pubkey_test
debug2: we sent a publickey packet, wait for reply
debug3: Received SSH2_MSG_IGNORE
debug1: Server accepts key: pkalg ssh-rsa blen 533
debug2: input_userauth_pk_ok: fp 46:bb:2a:c2:29:72:ad:bc:a7:04:c8:8d:77:31:6f:5e
debug3: sign_and_send_pubkey
debug3: Received SSH2_MSG_IGNORE
debug1: Authentication succeeded (publickey).
debug3: client_setup_stdio_fwd cfe1:22
debug1: channel_connect_stdio_fwd cfe1:22
debug1: channel 0: new [stdio-forward]
debug2: fd 4 setting O_NONBLOCK
debug2: fd 5 setting O_NONBLOCK
debug1: getpeername failed: Bad file descriptor
debug1: Entering interactive session.
debug3: Received SSH2_MSG_IGNORE
channel 0: open failed: connect failed: No description
debug2: channel 0: zombie
debug2: channel 0: gc: notify user
debug1: stdio forwarding: done
ssh_exchange_identification: Connection closed by remote host

And, for comparison, here's the output of a connection to the server
requesting TCP forwarding:

debug2: ssh_connect: needpriv 0
debug1: Connecting to sfe1 [129.99.242.1] port 22.
debug1: Connection established.
debug1: could not open key file '/etc/ssh/ssh_host_key': Permission denied
debug1: could not open key file '/etc/ssh/ssh_host_dsa_key': Permission denied
debug1: could not open key file '/etc/ssh/ssh_host_rsa_key': Permission denied
debug1: identity file /u/wk/imorgan/.ssh/identity type -1
debug3: Not a RSA1 key file /u/wk/imorgan/.ssh/id_rsa.
debug2: key_type_from_name: unknown key type '-----BEGIN'
debug3: key_read: missing keytype
debug2: key_type_from_name: unknown key type 'Proc-Type:'
debug3: key_read: missing keytype
debug2: key_type_from_name: unknown key type 'DEK-Info:'
debug3: key_read: missing keytype
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug2: key_type_from_name: unknown key type '-----END'
debug3: key_read: missing keytype
debug1: identity file /u/wk/imorgan/.ssh/id_rsa type 1
debug1: identity file /u/wk/imorgan/.ssh/id_dsa type -1
debug1: Remote protocol version 2.0, remote software version 6.0.6.19 SSH Tectia Server
debug1: no match: 6.0.6.19 SSH Tectia Server
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_5.3
debug2: fd 3 setting O_NONBLOCK
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
debug2: kex_parse_kexinit: arcfour,blowfish-cbc,cast128-cbc,aes128-cbc,3des-cbc
debug2: kex_parse_kexinit: arcfour,blowfish-cbc,cast128-cbc,aes128-cbc,3des-cbc
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64 at openssh.com,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64 at openssh.com,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none,zlib at openssh.com,zlib
debug2: kex_parse_kexinit: none,zlib at openssh.com,zlib
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: first_kex_follows 0 
debug2: kex_parse_kexinit: reserved 0 
debug2: kex_parse_kexinit: diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa
debug2: kex_parse_kexinit: aes128-cbc,aes192-cbc,aes256-cbc,3des-cbc
debug2: kex_parse_kexinit: aes128-cbc,aes192-cbc,aes256-cbc,3des-cbc
debug2: kex_parse_kexinit: hmac-sha1
debug2: kex_parse_kexinit: hmac-sha1
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: first_kex_follows 0 
debug2: kex_parse_kexinit: reserved 0 
debug2: mac_setup: found hmac-sha1
debug1: kex: server->client aes128-cbc hmac-sha1 none
debug2: mac_setup: found hmac-sha1
debug1: kex: client->server aes128-cbc hmac-sha1 none
debug2: dh_gen_key: priv key bits set: 161/320
debug2: bits set: 502/1024
debug1: sending SSH2_MSG_KEXDH_INIT
debug1: expecting SSH2_MSG_KEXDH_REPLY
debug3: check_host_in_hostfile: host sfe1 filename /u/wk/imorgan/.ssh/known_hosts
debug3: check_host_in_hostfile: host sfe1 filename /etc/ssh/ssh_known_hosts
debug3: check_host_in_hostfile: match line 896
debug3: check_host_in_hostfile: host 129.99.242.1 filename /u/wk/imorgan/.ssh/known_hosts
debug3: check_host_in_hostfile: host 129.99.242.1 filename /etc/ssh/ssh_known_hosts
debug3: check_host_in_hostfile: match line 896
debug1: Host 'sfe1' is known and matches the RSA host key.
debug1: Found key in /etc/ssh/ssh_known_hosts:896
debug2: bits set: 522/1024
debug1: ssh_rsa_verify: signature correct
debug2: kex_derive_keys
debug2: set_newkeys: mode 1
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug2: set_newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: Roaming not allowed by server
debug1: SSH2_MSG_SERVICE_REQUEST sent
debug3: Received SSH2_MSG_IGNORE
debug3: Received SSH2_MSG_IGNORE
debug2: service_accept: ssh-userauth
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug2: key: /u/wk/imorgan/.ssh/id_rsa (0x149ca780)
debug2: key: /u/wk/imorgan/.ssh/identity ((nil))
debug2: key: /u/wk/imorgan/.ssh/id_dsa ((nil))
debug3: Received SSH2_MSG_IGNORE
debug3: input_userauth_banner
----------------------------------------------------------------

WARNING! This is a US Government computer. This system is for
the use of authorized users only. By accessing and using the
computer system you are consenting to system monitoring,
including the monitoring of keystrokes. Unauthorized use of, or
access to, this computer system may subject you to disciplinary
action and criminal prosecution.

----------------------------------------------------------------
debug3: Received SSH2_MSG_IGNORE
debug1: Authentications that can continue: keyboard-interactive
debug3: start over, passed a different list keyboard-interactive
debug3: preferred publickey,keyboard-interactive,password
debug3: authmethod_lookup keyboard-interactive
debug3: remaining preferred: password
debug3: authmethod_is_enabled keyboard-interactive
debug1: Next authentication method: keyboard-interactive
debug2: userauth_kbdint
debug2: we sent a keyboard-interactive packet, wait for reply
debug3: Received SSH2_MSG_IGNORE
debug2: input_userauth_info_req
PAM Authentication
debug2: input_userauth_info_req: num_prompts 1
debug3: packet_send2: adding 32 (len 26 padlen 6 extra_pad 64)
debug3: Received SSH2_MSG_IGNORE
Authenticated with partial success.
debug1: Authentications that can continue: password,publickey
debug3: start over, passed a different list password,publickey
debug3: preferred publickey,keyboard-interactive,password
debug3: authmethod_lookup publickey
debug3: remaining preferred: keyboard-interactive,password
debug3: authmethod_is_enabled publickey
debug1: Next authentication method: publickey
debug1: Offering public key: /u/wk/imorgan/.ssh/id_rsa
debug3: send_pubkey_test
debug2: we sent a publickey packet, wait for reply
debug3: Received SSH2_MSG_IGNORE
debug1: Server accepts key: pkalg ssh-rsa blen 533
debug2: input_userauth_pk_ok: fp 46:bb:2a:c2:29:72:ad:bc:a7:04:c8:8d:77:31:6f:5e
debug3: sign_and_send_pubkey
debug3: Received SSH2_MSG_IGNORE
debug1: Authentication succeeded (publickey).
debug1: Local connections to LOCALHOST:2122 forwarded to remote address cfe1:22
debug3: channel_setup_fwd_listener: type 2 wildcard 0 addr NULL
debug1: Local forwarding listening on 127.0.0.1 port 2122.
debug2: fd 4 setting O_NONBLOCK
debug3: fd 4 is O_NONBLOCK
debug1: channel 0: new [port listener]
debug2: fd 7 setting O_NONBLOCK
debug1: channel 1: new [client-session]
debug3: ssh_session2_open: channel_new: 1
debug2: channel 1: send open
debug1: Entering interactive session.
debug3: Received SSH2_MSG_IGNORE
debug2: callback start
debug2: x11_get_proto: /usr/bin/xauth  list :0.0 2>/dev/null
Warning: No xauth data; using fake authentication data for X11 forwarding.
debug1: Requesting X11 forwarding with authentication spoofing.
debug2: channel 1: request x11-req confirm 0
debug1: Requesting authentication agent forwarding.
debug2: channel 1: request auth-agent-req at openssh.com confirm 0
debug2: client_session2_setup: id 1
debug2: channel 1: request pty-req confirm 1
debug2: channel 1: request shell confirm 1
debug2: fd 3 setting TCP_NODELAY
debug2: callback done
debug2: channel 1: open confirm rwindow 65536 rmax 4096
debug3: Received SSH2_MSG_IGNORE
debug2: channel_input_status_confirm: type 99 id 1
debug2: PTY allocation request accepted on channel 1
debug3: Received SSH2_MSG_IGNORE
debug2: channel_input_status_confirm: type 99 id 1
debug2: shell request accepted on channel 1
debug3: Received SSH2_MSG_IGNORE
debug1: Connection to port 2122 forwarding to cfe1 port 22 requested.
debug2: fd 8 setting TCP_NODELAY
debug2: fd 8 setting O_NONBLOCK
debug3: fd 8 is O_NONBLOCK
debug1: channel 2: new [direct-tcpip]
debug3: Received SSH2_MSG_IGNORE
debug2: channel 2: open confirm rwindow 65536 rmax 4096
debug3: Received SSH2_MSG_IGNORE
debug3: Received SSH2_MSG_IGNORE
debug3: Received SSH2_MSG_IGNORE
debug3: Received SSH2_MSG_IGNORE
debug2: channel 2: read<=0 rfd 8 len 0
debug2: channel 2: read failed
debug2: channel 2: close_read
debug2: channel 2: input open -> drain
debug2: channel 2: ibuf empty
debug2: channel 2: send eof
debug2: channel 2: input drain -> closed
debug3: Received SSH2_MSG_IGNORE
debug2: channel 2: rcvd close
debug2: channel 2: output open -> drain
debug3: channel 2: will not send data after close
debug2: channel 2: obuf empty
debug2: channel 2: close_write
debug2: channel 2: output drain -> closed
debug2: channel 2: send close
debug2: channel 2: is dead
debug2: channel 2: garbage collecting
debug1: channel 2: free: direct-tcpip: listening port 2122 for cfe1 port 22, connect from 127.0.0.1 port 51329, nchannels 3
debug3: channel 2: status: The following connections are open:
  #1 client-session (t4 r0 i0/0 o0/0 fd 5/6 cc -1)
  #2 direct-tcpip: listening port 2122 for cfe1 port 22, connect from 127.0.0.1 port 51329 (t4 r1 i3/0 o3/0 fd 8/8 cc -1)

debug3: channel 2: close_fds r 8 w 8 e -1
debug3: Received SSH2_MSG_IGNORE
debug3: Received SSH2_MSG_IGNORE
debug3: Received SSH2_MSG_IGNORE
debug3: Received SSH2_MSG_IGNORE
debug3: Received SSH2_MSG_IGNORE
debug3: Received SSH2_MSG_IGNORE
debug1: client_input_channel_req: channel 1 rtype exit-status reply 0
debug2: channel 1: rcvd close
debug2: channel 1: output open -> drain
debug2: channel 1: close_read
debug2: channel 1: input open -> closed
debug3: channel 1: will not send data after close
debug2: channel 1: obuf empty
debug2: channel 1: close_write
debug2: channel 1: output drain -> closed
debug2: channel 1: almost dead
debug2: channel 1: gc: notify user
debug2: channel 1: gc: user detached
debug2: channel 1: send close
debug2: channel 1: is dead
debug2: channel 1: garbage collecting
debug1: channel 1: free: client-session, nchannels 2
debug3: channel 1: status: The following connections are open:
  #1 client-session (t4 r0 i3/0 o3/0 fd -1/-1 cc -1)

debug3: channel 1: close_fds r -1 w -1 e 7
debug1: channel 0: free: port listener, nchannels 1
debug3: channel 0: status: The following connections are open:

debug3: channel 0: close_fds r 4 w 4 e -1
debug1: fd 2 clearing O_NONBLOCK
Connection to sfe1 closed.
Transferred: sent 4680, received 9376 bytes, in 59.6 seconds
Bytes per second: sent 78.5, received 157.2
debug1: Exit status 0

-- 
Iain Morgan


More information about the openssh-unix-dev mailing list