scp fails after sending command: scp -v -t

phorminx at web.de phorminx at web.de
Sun Sep 4 17:40:44 EST 2011


Thanks for the quick reply. Unfortunately, reducing the MTU on the
client and server side to 576 (default was 1500) did not solve my
problem.

I assume that the MTU suggested there (the value 576) is a
reasonable value that _should_ be small enough to avoid the
fragmentation problem. Well, I could reduce this number further. Yet
I do not want to experiment with yet smaller values till I reach the
point where I cannot reach at all anymore the server.
Then I would be really stuck!

Any thoughts or ideas? Thanks a lot!

I could add another strange observation: I like GNU emacs. This
comes with TRAMP, the `Transparent Remote (file) Access, Multiple
Protocol'. When I establish a TRAMP/ssh connection to the remote
server, I can transfer big files just fine. Unfortunately, I do not
know more details about how TRAMP is doing this internally. All I
can say is that my TRAMP session uses the so-called `scpc' method
which combines ssh with scp by reusing an existing `ssh' channel via
the ssh `ControlMaster' option. So it does something like (taken
from the TRAMP debug output)

  scp -p -q -r -o ControlPath=/home/phorminx/emacs/scratch/tramp.4900PZy.%r@%h:%p -o ControlMaster=auto phorminx at foo.bar.com:/home/phorminx/foo.txt /home/phorminx/emacs/scratch/tramp.49009EH.txt

(I have attached the server debug output from such a session. I
could also provide the complete TRAMP debug output. Yet this might
be more difficult to digest for you as it uses emacs/TRAMP's
internal format.)

The main reason I mention this here is that if the MTU value was the
real problem, I expect it should affect the TRAMP/ssh connection,
too.

# /usr/sbin/sshd -d
debug1: sshd version OpenSSH_4.7p1 Debian-8ubuntu3
debug1: read PEM private key done: type RSA
debug1: Checking blacklist file /etc/ssh/blacklist.RSA-2048
debug1: private host key: #0 type 1 RSA
debug1: read PEM private key done: type DSA
debug1: Checking blacklist file /etc/ssh/blacklist.DSA-1024
debug1: private host key: #1 type 2 DSA
debug1: rexec_argv[0]='/usr/sbin/sshd'
debug1: rexec_argv[1]='-d'
debug1: Bind to port 22 on ::.
Server listening on :: port 22.
debug1: Bind to port 22 on 0.0.0.0.
Server listening on 0.0.0.0 port 22.
debug1: Server will not fork when running in debugging mode.
debug1: rexec start in 5 out 5 newsock 5 pipe -1 sock 8
debug1: inetd sockets after dupping: 3, 3
Connection from 98.765.432.10 port 51539
debug1: Client protocol version 2.0; client software version OpenSSH_5.3p1 Debian-3ubuntu7
debug1: match: OpenSSH_5.3p1 Debian-3ubuntu7 pat OpenSSH*
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_4.7p1 Debian-8ubuntu3
debug1: permanently_set_uid: 112/65534
debug1: list_hostkey_types: ssh-rsa,ssh-dss
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug1: kex: client->server aes128-ctr hmac-md5 none
debug1: kex: server->client aes128-ctr hmac-md5 none
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST received
debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT
debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug1: SSH2_MSG_NEWKEYS received
debug1: KEX done
debug1: userauth-request for user phorminx service ssh-connection method none
debug1: attempt 0 failures 0
debug1: userauth-request for user phorminx service ssh-connection method publickey
debug1: attempt 1 failures 1
debug1: test whether pkalg/pkblob are acceptable
debug1: Checking blacklist file /etc/ssh/blacklist.DSA-1024
debug1: temporarily_use_uid: 1000/1000 (e=0/0)
debug1: trying public key file /home/phorminx/.ssh/authorized_keys
debug1: restore_uid: 0/0
debug1: temporarily_use_uid: 1000/1000 (e=0/0)
debug1: trying public key file /home/phorminx/.ssh/authorized_keys2
debug1: restore_uid: 0/0
Failed publickey for phorminx from 98.765.432.10 port 51539 ssh2
debug1: userauth-request for user phorminx service ssh-connection method publickey
debug1: attempt 2 failures 2
debug1: test whether pkalg/pkblob are acceptable
debug1: Checking blacklist file /etc/ssh/blacklist.RSA-1024
debug1: temporarily_use_uid: 1000/1000 (e=0/0)
debug1: trying public key file /home/phorminx/.ssh/authorized_keys
debug1: matching key found: file /home/phorminx/.ssh/authorized_keys, line 3
Found matching RSA key: a5:d8:80:5e:f5:83:c5:eb:d0:38:13:d8:d4:87:de:cd
debug1: restore_uid: 0/0
Postponed publickey for phorminx from 98.765.432.10 port 51539 ssh2
debug1: userauth-request for user phorminx service ssh-connection method publickey
debug1: attempt 3 failures 2
debug1: Checking blacklist file /etc/ssh/blacklist.RSA-1024
debug1: temporarily_use_uid: 1000/1000 (e=0/0)
debug1: trying public key file /home/phorminx/.ssh/authorized_keys
debug1: matching key found: file /home/phorminx/.ssh/authorized_keys, line 3
Found matching RSA key: a5:d8:80:5e:f5:83:c5:eb:d0:38:13:d8:d4:87:de:cd
debug1: restore_uid: 0/0
debug1: ssh_rsa_verify: signature correct
Accepted publickey for phorminx from 98.765.432.10 port 51539 ssh2
debug1: monitor_child_preauth: phorminx has been authenticated by privileged process
debug1: permanently_set_uid: 1000/1000
debug1: SELinux support disabled
debug1: Entering interactive session for SSH2.
debug1: server_init_dispatch_20
debug1: server_input_channel_open: ctype session rchan 0 win 1048576 max 16384
debug1: input_session_request
debug1: channel 0: new [server-session]
debug1: session_new: init
debug1: session_new: session 0
debug1: session_open: channel 0
debug1: session_open: session 0: link with channel 0
debug1: server_input_channel_open: confirm session
debug1: server_input_channel_req: channel 0 request pty-req reply 1
debug1: session_by_channel: session 0 channel 0
debug1: session_input_channel_req: session 0 req pty-req
debug1: Allocating pty.
debug1: session_new: init
debug1: session_new: session 0
debug1: SELinux support disabled
debug1: session_pty_req: session 0 alloc /dev/pts/2
debug1: server_input_channel_req: channel 0 request env reply 0
debug1: session_by_channel: session 0 channel 0
debug1: session_input_channel_req: session 0 req env
debug1: server_input_channel_req: channel 0 request env reply 0
debug1: session_by_channel: session 0 channel 0
debug1: session_input_channel_req: session 0 req env
debug1: server_input_channel_req: channel 0 request env reply 0
debug1: session_by_channel: session 0 channel 0
debug1: session_input_channel_req: session 0 req env
debug1: server_input_channel_req: channel 0 request env reply 0
debug1: session_by_channel: session 0 channel 0
debug1: session_input_channel_req: session 0 req env
debug1: server_input_channel_req: channel 0 request shell reply 1
debug1: session_by_channel: session 0 channel 0
debug1: session_input_channel_req: session 0 req shell
debug1: Setting controlling tty using TIOCSCTTY.
debug1: session_by_tty: session 0 tty /dev/pts/2
debug1: registered uid=1000 on tty='/dev/pts/2' with ConsoleKit
debug1: server_input_channel_open: ctype session rchan 1 win 2097152 max 32768
debug1: input_session_request
debug1: channel 1: new [server-session]
debug1: session_new: session 1
debug1: session_open: channel 1
debug1: session_open: session 1: link with channel 1
debug1: server_input_channel_open: confirm session
debug1: server_input_channel_req: channel 1 request env reply 0
debug1: session_by_channel: session 1 channel 1
debug1: session_input_channel_req: session 1 req env
debug1: server_input_channel_req: channel 1 request env reply 0
debug1: session_by_channel: session 1 channel 1
debug1: session_input_channel_req: session 1 req env
debug1: server_input_channel_req: channel 1 request env reply 0
debug1: session_by_channel: session 1 channel 1
debug1: session_input_channel_req: session 1 req env
debug1: server_input_channel_req: channel 1 request exec reply 1
debug1: session_by_channel: session 1 channel 1
debug1: session_input_channel_req: session 1 req exec
debug1: Received SIGCHLD.
debug1: session_by_pid: pid 23086
debug1: session_exit_message: session 1 channel 1 pid 23086
debug1: session_exit_message: release channel 1
debug1: session_by_channel: session 1 channel 1
debug1: session_close_by_channel: channel 1 child 0
debug1: session_close: session 1 pid 0
debug1: channel 1: free: server-session, nchannels 2
Received disconnect from 98.765.432.10: 11: disconnected by user
debug1: do_cleanup
debug1: do_cleanup
debug1: session_pty_cleanup: session 0 release /dev/pts/2
debug1: unregistering ConsoleKit session f3021f11585cab6e6e7cce3849403e97-1315120728.670360-1872441218

___________________________________________________________
Schon gehört? WEB.DE hat einen genialen Phishing-Filter in die
Toolbar eingebaut! http://produkte.web.de/go/toolbar


More information about the openssh-unix-dev mailing list