Call for testing: OpenSSH-6.5
Hisashi T Fujinaka
htodd at twofifty.com
Thu Jan 23 14:22:28 EST 2014
On Thu, 23 Jan 2014, Darren Tucker wrote:
> On Thu, Jan 23, 2014 at 12:13 PM, Hisashi T Fujinaka <htodd at twofifty.com> wrote:
>> #1 0x00007f7ff62a11f8 in strnvis (mbdst=<optimized out>,
>> dlen=140187732525536, mbsrc=<optimized out>, flags=<optimized out>)
>> at /usr/src/lib/libc/gen/vis.c:655
>
> strnvis? interesting. Could you please try:
>
> ../../configure --with-cflags=-DBROKEN_STRNVIS && make clean && make tests
I gave up on the file copy and here are the three fail logs.
--
Hisashi T Fujinaka - htodd at twofifty.com
BSEE(6/86) + BSChem(3/95) + BAEnglish(8/95) + MSCS(8/03) + $2.50 = latte
-------------- next part --------------
trace: generate keys
FATAL: sshd_proxy broken
trace: generate keys
FATAL: sshd_proxy broken
FAIL: sshd_proxy broken
trace: scp: simple copy remote file to local file
FATAL:
trace: scp: simple copy remote file to local file
FATAL:
FAIL:
trace: test remote exit status: proto 1 status 0
debug1: inetd sockets after dupping: 4, 5
Connection from UNKNOWN port 65535 on UNKNOWN port 65535
debug1: Client protocol version 1.5; client software version OpenSSH_6.5
debug1: match: OpenSSH_6.5 pat OpenSSH* compat 0x04000000
debug1: Local version string SSH-1.99-OpenSSH_6.5
Generating 1024 bit RSA key.
RSA key generation complete.
debug2: fd 4 setting O_NONBLOCK
debug2: fd 5 setting O_NONBLOCK
debug2: Network child is on pid 4361
debug3: preauth child monitor started
debug1: Sent 1024 bit server key and 2048 bit host key. [preauth]
debug1: Encryption type: 3des [preauth]
debug3: mm_request_send entering: type 32 [preauth]
debug3: mm_request_receive entering
debug3: monitor_read: checking request 32
debug3: mm_request_send entering: type 33
debug2: monitor_read: 32 used once, disabling now
debug3: mm_request_receive_expect entering: type 33 [preauth]
debug3: mm_request_receive entering [preauth]
debug3: mm_ssh1_session_id entering [preauth]
debug3: mm_request_send entering: type 34 [preauth]
debug3: mm_request_receive entering
debug3: monitor_read: checking request 34
debug3: mm_answer_sessid entering
debug2: monitor_read: 34 used once, disabling now
debug2: cipher_init: set keylen (16 -> 32) [preauth]
debug2: cipher_init: set keylen (16 -> 32) [preauth]
debug1: Received session key; encryption turned on. [preauth]
debug1: Installing crc compensation attack detector. [preauth]
debug3: mm_getpwnamallow entering [preauth]
debug3: mm_request_send entering: type 8 [preauth]
debug3: mm_request_receive entering
debug3: monitor_read: checking request 8
debug3: mm_answer_pwnamallow
debug2: parse_server_config: config reprocess config len 405
debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1
debug3: mm_request_send entering: type 9
debug2: monitor_read: 8 used once, disabling now
debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM [preauth]
debug3: mm_request_receive_expect entering: type 9 [preauth]
debug3: mm_request_receive entering [preauth]
debug1: Attempting authentication for htodd. [preauth]
debug3: mm_auth_rsa_key_allowed entering [preauth]
debug3: mm_request_send entering: type 36 [preauth]
debug3: mm_request_receive entering
debug3: monitor_read: checking request 36
debug3: mm_answer_rsa_keyallowed entering
debug1: trying public RSA key file /home/htodd/openssh/regress/authorized_keys_htodd
debug1: fd 6 clearing O_NONBLOCK
debug1: /home/htodd/openssh/regress/authorized_keys_htodd, line 1: non ssh1 key syntax
debug1: matching key found: file /home/htodd/openssh/regress/authorized_keys_htodd, line 2 RSA1 fe:d0:cf:47:30:46:c1:1f:55:e5:4e:60:2a:9f:1d:3b
debug1: restore_uid: (unprivileged)
debug3: mm_request_send entering: type 37
Failed rsa for htodd from UNKNOWN port 65535 ssh1
debug3: mm_request_receive_expect entering: type 37 [preauth]
debug3: mm_request_receive entering [preauth]
debug3: mm_auth_rsa_generate_challenge entering [preauth]
debug3: mm_request_send entering: type 38 [preauth]
debug3: mm_request_receive entering
debug3: monitor_read: checking request 38
debug3: mm_answer_rsa_challenge entering
debug3: mm_answer_rsa_challenge sending reply
debug3: mm_request_send entering: type 39
debug2: monitor_read: 38 used once, disabling now
debug3: mm_request_receive_expect entering: type 39 [preauth]
debug3: mm_request_receive entering [preauth]
debug3: mm_auth_rsa_verify_response entering [preauth]
debug3: mm_request_send entering: type 40 [preauth]
debug3: mm_request_receive entering
debug3: monitor_read: checking request 40
debug3: mm_answer_rsa_response entering
debug3: mm_request_send entering: type 41
debug2: monitor_read: 40 used once, disabling now
Accepted rsa for htodd from UNKNOWN port 65535 ssh1
debug1: monitor_child_preauth: htodd has been authenticated by privileged process
debug3: mm_get_keystate: Waiting for new keys
debug3: mm_request_receive_expect entering: type 26
debug3: mm_request_receive entering
debug3: mm_get_keystate: Getting compression state
debug3: mm_get_keystate: Getting Network I/O buffers
debug3: mm_request_receive_expect entering: type 41 [preauth]
debug3: mm_request_receive entering [preauth]
debug3: mm_send_keystate: Sending ssh1 KEY+IV [preauth]
debug3: ssh1_3des_iv: Copying 3DES IV [preauth]
debug3: ssh1_3des_iv: Copying 3DES IV [preauth]
debug3: mm_send_keystate: Sending compression state [preauth]
debug3: mm_request_send entering: type 26 [preauth]
debug3: mm_send_keystate: Finished sending state [preauth]
debug1: monitor_read_log: child log fd closed
debug3: mm_share_sync: Share sync
debug3: mm_share_sync: Share sync end
User child is on pid 2619
debug2: cipher_init: set keylen (16 -> 32)
debug2: cipher_init: set keylen (16 -> 32)
debug3: ssh1_3des_iv: Installed 3DES IV
debug3: ssh1_3des_iv: Installed 3DES IV
debug2: session_new: allocate (allocated 0 max 10)
debug3: session_unused: session id 0 unused
debug1: session_new: session 0
debug1: Installing crc compensation attack detector.
debug1: Exec command 'exit 0'
Starting session: command for htodd from UNKNOWN port 65535
debug1: Entering interactive session.
debug2: fd 8 setting O_NONBLOCK
debug2: fd 9 setting O_NONBLOCK
debug2: fd 11 setting O_NONBLOCK
debug2: fd 7 setting O_NONBLOCK
debug2: fd 10 setting O_NONBLOCK
debug1: server_init_dispatch_13
debug1: server_init_dispatch_15
debug2: notify_done: reading
debug1: End of interactive session; stdin 0, stdout (read 0, sent 0), stderr 0 bytes.
debug1: Command exited with status 0.
debug3: mm_request_receive entering
debug1: do_cleanup
debug1: inetd sockets after dupping: 4, 5
Connection from UNKNOWN port 65535 on UNKNOWN port 65535
debug1: Client protocol version 1.5; client software version OpenSSH_6.5
debug1: match: OpenSSH_6.5 pat OpenSSH* compat 0x04000000
debug1: Local version string SSH-1.99-OpenSSH_6.5
Generating 1024 bit RSA key.
RSA key generation complete.
debug2: fd 4 setting O_NONBLOCK
debug2: fd 5 setting O_NONBLOCK
debug2: Network child is on pid 3499
debug3: preauth child monitor started
debug1: Sent 1024 bit server key and 2048 bit host key. [preauth]
debug1: Encryption type: 3des [preauth]
debug3: mm_request_send entering: type 32 [preauth]
debug3: mm_request_receive entering
debug3: monitor_read: checking request 32
debug3: mm_request_send entering: type 33
debug2: monitor_read: 32 used once, disabling now
debug3: mm_request_receive_expect entering: type 33 [preauth]
debug3: mm_request_receive entering [preauth]
debug3: mm_ssh1_session_id entering [preauth]
debug3: mm_request_send entering: type 34 [preauth]
debug3: mm_request_receive entering
debug3: monitor_read: checking request 34
debug3: mm_answer_sessid entering
debug2: monitor_read: 34 used once, disabling now
debug2: cipher_init: set keylen (16 -> 32) [preauth]
debug2: cipher_init: set keylen (16 -> 32) [preauth]
debug1: Received session key; encryption turned on. [preauth]
debug1: Installing crc compensation attack detector. [preauth]
debug3: mm_getpwnamallow entering [preauth]
debug3: mm_request_send entering: type 8 [preauth]
debug3: mm_request_receive entering
debug3: monitor_read: checking request 8
debug3: mm_answer_pwnamallow
debug2: parse_server_config: config reprocess config len 405
debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1
debug3: mm_request_send entering: type 9
debug2: monitor_read: 8 used once, disabling now
debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM [preauth]
debug3: mm_request_receive_expect entering: type 9 [preauth]
debug3: mm_request_receive entering [preauth]
debug1: Attempting authentication for htodd. [preauth]
debug3: mm_auth_rsa_key_allowed entering [preauth]
debug3: mm_request_send entering: type 36 [preauth]
debug3: mm_request_receive entering
debug3: monitor_read: checking request 36
debug3: mm_answer_rsa_keyallowed entering
debug1: trying public RSA key file /home/htodd/openssh/regress/authorized_keys_htodd
debug1: fd 6 clearing O_NONBLOCK
debug1: /home/htodd/openssh/regress/authorized_keys_htodd, line 1: non ssh1 key syntax
debug1: matching key found: file /home/htodd/openssh/regress/authorized_keys_htodd, line 2 RSA1 fe:d0:cf:47:30:46:c1:1f:55:e5:4e:60:2a:9f:1d:3b
debug1: restore_uid: (unprivileged)
debug3: mm_request_send entering: type 37
Failed rsa for htodd from UNKNOWN port 65535 ssh1
debug3: mm_request_receive_expect entering: type 37 [preauth]
debug3: mm_request_receive entering [preauth]
debug3: mm_auth_rsa_generate_challenge entering [preauth]
debug3: mm_request_send entering: type 38 [preauth]
debug3: mm_request_receive entering
debug3: monitor_read: checking request 38
debug3: mm_answer_rsa_challenge entering
debug3: mm_answer_rsa_challenge sending reply
debug3: mm_request_send entering: type 39
debug2: monitor_read: 38 used once, disabling now
debug3: mm_request_receive_expect entering: type 39 [preauth]
debug3: mm_request_receive entering [preauth]
debug3: mm_auth_rsa_verify_response entering [preauth]
debug3: mm_request_send entering: type 40 [preauth]
debug3: mm_request_receive entering
debug3: monitor_read: checking request 40
debug3: mm_answer_rsa_response entering
debug3: mm_request_send entering: type 41
debug2: monitor_read: 40 used once, disabling now
Accepted rsa for htodd from UNKNOWN port 65535 ssh1
debug1: monitor_child_preauth: htodd has been authenticated by privileged process
debug3: mm_get_keystate: Waiting for new keys
debug3: mm_request_receive_expect entering: type 26
debug3: mm_request_receive entering
debug3: mm_get_keystate: Getting compression state
debug3: mm_get_keystate: Getting Network I/O buffers
debug3: mm_request_receive_expect entering: type 41 [preauth]
debug3: mm_request_receive entering [preauth]
debug3: mm_send_keystate: Sending ssh1 KEY+IV [preauth]
debug3: ssh1_3des_iv: Copying 3DES IV [preauth]
debug3: ssh1_3des_iv: Copying 3DES IV [preauth]
debug3: mm_send_keystate: Sending compression state [preauth]
debug3: mm_request_send entering: type 26 [preauth]
debug3: mm_send_keystate: Finished sending state [preauth]
debug1: monitor_read_log: child log fd closed
debug3: mm_share_sync: Share sync
debug3: mm_share_sync: Share sync end
User child is on pid 4961
debug2: cipher_init: set keylen (16 -> 32)
debug2: cipher_init: set keylen (16 -> 32)
debug3: ssh1_3des_iv: Installed 3DES IV
debug3: ssh1_3des_iv: Installed 3DES IV
debug2: session_new: allocate (allocated 0 max 10)
debug3: session_unused: session id 0 unused
debug1: session_new: session 0
debug1: Installing crc compensation attack detector.
debug1: Exec command 'exec sh -c 'sleep 2; exec > /dev/null 2>&1; sleep 3; exit 0''
Starting session: command for htodd from UNKNOWN port 65535
debug1: Entering interactive session.
debug2: fd 8 setting O_NONBLOCK
debug2: fd 9 setting O_NONBLOCK
debug2: fd 11 setting O_NONBLOCK
debug2: fd 7 setting O_NONBLOCK
debug2: fd 10 setting O_NONBLOCK
debug1: server_init_dispatch_13
debug1: server_init_dispatch_15
debug1: EOF received for stdin.
debug3: mm_request_receive entering
debug1: do_cleanup
FATAL:
trace: test remote exit status: proto 1 status 0
debug1: inetd sockets after dupping: 4, 5
Connection from UNKNOWN port 65535 on UNKNOWN port 65535
debug1: Client protocol version 1.5; client software version OpenSSH_6.5
debug1: match: OpenSSH_6.5 pat OpenSSH* compat 0x04000000
debug1: Local version string SSH-1.99-OpenSSH_6.5
Generating 1024 bit RSA key.
RSA key generation complete.
debug2: fd 4 setting O_NONBLOCK
debug2: fd 5 setting O_NONBLOCK
debug2: Network child is on pid 4361
debug3: preauth child monitor started
debug1: Sent 1024 bit server key and 2048 bit host key. [preauth]
debug1: Encryption type: 3des [preauth]
debug3: mm_request_send entering: type 32 [preauth]
debug3: mm_request_receive entering
debug3: monitor_read: checking request 32
debug3: mm_request_send entering: type 33
debug2: monitor_read: 32 used once, disabling now
debug3: mm_request_receive_expect entering: type 33 [preauth]
debug3: mm_request_receive entering [preauth]
debug3: mm_ssh1_session_id entering [preauth]
debug3: mm_request_send entering: type 34 [preauth]
debug3: mm_request_receive entering
debug3: monitor_read: checking request 34
debug3: mm_answer_sessid entering
debug2: monitor_read: 34 used once, disabling now
debug2: cipher_init: set keylen (16 -> 32) [preauth]
debug2: cipher_init: set keylen (16 -> 32) [preauth]
debug1: Received session key; encryption turned on. [preauth]
debug1: Installing crc compensation attack detector. [preauth]
debug3: mm_getpwnamallow entering [preauth]
debug3: mm_request_send entering: type 8 [preauth]
debug3: mm_request_receive entering
debug3: monitor_read: checking request 8
debug3: mm_answer_pwnamallow
debug2: parse_server_config: config reprocess config len 405
debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1
debug3: mm_request_send entering: type 9
debug2: monitor_read: 8 used once, disabling now
debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM [preauth]
debug3: mm_request_receive_expect entering: type 9 [preauth]
debug3: mm_request_receive entering [preauth]
debug1: Attempting authentication for htodd. [preauth]
debug3: mm_auth_rsa_key_allowed entering [preauth]
debug3: mm_request_send entering: type 36 [preauth]
debug3: mm_request_receive entering
debug3: monitor_read: checking request 36
debug3: mm_answer_rsa_keyallowed entering
debug1: trying public RSA key file /home/htodd/openssh/regress/authorized_keys_htodd
debug1: fd 6 clearing O_NONBLOCK
debug1: /home/htodd/openssh/regress/authorized_keys_htodd, line 1: non ssh1 key syntax
debug1: matching key found: file /home/htodd/openssh/regress/authorized_keys_htodd, line 2 RSA1 fe:d0:cf:47:30:46:c1:1f:55:e5:4e:60:2a:9f:1d:3b
debug1: restore_uid: (unprivileged)
debug3: mm_request_send entering: type 37
Failed rsa for htodd from UNKNOWN port 65535 ssh1
debug3: mm_request_receive_expect entering: type 37 [preauth]
debug3: mm_request_receive entering [preauth]
debug3: mm_auth_rsa_generate_challenge entering [preauth]
debug3: mm_request_send entering: type 38 [preauth]
debug3: mm_request_receive entering
debug3: monitor_read: checking request 38
debug3: mm_answer_rsa_challenge entering
debug3: mm_answer_rsa_challenge sending reply
debug3: mm_request_send entering: type 39
debug2: monitor_read: 38 used once, disabling now
debug3: mm_request_receive_expect entering: type 39 [preauth]
debug3: mm_request_receive entering [preauth]
debug3: mm_auth_rsa_verify_response entering [preauth]
debug3: mm_request_send entering: type 40 [preauth]
debug3: mm_request_receive entering
debug3: monitor_read: checking request 40
debug3: mm_answer_rsa_response entering
debug3: mm_request_send entering: type 41
debug2: monitor_read: 40 used once, disabling now
Accepted rsa for htodd from UNKNOWN port 65535 ssh1
debug1: monitor_child_preauth: htodd has been authenticated by privileged process
debug3: mm_get_keystate: Waiting for new keys
debug3: mm_request_receive_expect entering: type 26
debug3: mm_request_receive entering
debug3: mm_get_keystate: Getting compression state
debug3: mm_get_keystate: Getting Network I/O buffers
debug3: mm_request_receive_expect entering: type 41 [preauth]
debug3: mm_request_receive entering [preauth]
debug3: mm_send_keystate: Sending ssh1 KEY+IV [preauth]
debug3: ssh1_3des_iv: Copying 3DES IV [preauth]
debug3: ssh1_3des_iv: Copying 3DES IV [preauth]
debug3: mm_send_keystate: Sending compression state [preauth]
debug3: mm_request_send entering: type 26 [preauth]
debug3: mm_send_keystate: Finished sending state [preauth]
debug1: monitor_read_log: child log fd closed
debug3: mm_share_sync: Share sync
debug3: mm_share_sync: Share sync end
User child is on pid 2619
debug2: cipher_init: set keylen (16 -> 32)
debug2: cipher_init: set keylen (16 -> 32)
debug3: ssh1_3des_iv: Installed 3DES IV
debug3: ssh1_3des_iv: Installed 3DES IV
debug2: session_new: allocate (allocated 0 max 10)
debug3: session_unused: session id 0 unused
debug1: session_new: session 0
debug1: Installing crc compensation attack detector.
debug1: Exec command 'exit 0'
Starting session: command for htodd from UNKNOWN port 65535
debug1: Entering interactive session.
debug2: fd 8 setting O_NONBLOCK
debug2: fd 9 setting O_NONBLOCK
debug2: fd 11 setting O_NONBLOCK
debug2: fd 7 setting O_NONBLOCK
debug2: fd 10 setting O_NONBLOCK
debug1: server_init_dispatch_13
debug1: server_init_dispatch_15
debug2: notify_done: reading
debug1: End of interactive session; stdin 0, stdout (read 0, sent 0), stderr 0 bytes.
debug1: Command exited with status 0.
debug3: mm_request_receive entering
debug1: do_cleanup
debug1: inetd sockets after dupping: 4, 5
Connection from UNKNOWN port 65535 on UNKNOWN port 65535
debug1: Client protocol version 1.5; client software version OpenSSH_6.5
debug1: match: OpenSSH_6.5 pat OpenSSH* compat 0x04000000
debug1: Local version string SSH-1.99-OpenSSH_6.5
Generating 1024 bit RSA key.
RSA key generation complete.
debug2: fd 4 setting O_NONBLOCK
debug2: fd 5 setting O_NONBLOCK
debug2: Network child is on pid 3499
debug3: preauth child monitor started
debug1: Sent 1024 bit server key and 2048 bit host key. [preauth]
debug1: Encryption type: 3des [preauth]
debug3: mm_request_send entering: type 32 [preauth]
debug3: mm_request_receive entering
debug3: monitor_read: checking request 32
debug3: mm_request_send entering: type 33
debug2: monitor_read: 32 used once, disabling now
debug3: mm_request_receive_expect entering: type 33 [preauth]
debug3: mm_request_receive entering [preauth]
debug3: mm_ssh1_session_id entering [preauth]
debug3: mm_request_send entering: type 34 [preauth]
debug3: mm_request_receive entering
debug3: monitor_read: checking request 34
debug3: mm_answer_sessid entering
debug2: monitor_read: 34 used once, disabling now
debug2: cipher_init: set keylen (16 -> 32) [preauth]
debug2: cipher_init: set keylen (16 -> 32) [preauth]
debug1: Received session key; encryption turned on. [preauth]
debug1: Installing crc compensation attack detector. [preauth]
debug3: mm_getpwnamallow entering [preauth]
debug3: mm_request_send entering: type 8 [preauth]
debug3: mm_request_receive entering
debug3: monitor_read: checking request 8
debug3: mm_answer_pwnamallow
debug2: parse_server_config: config reprocess config len 405
debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1
debug3: mm_request_send entering: type 9
debug2: monitor_read: 8 used once, disabling now
debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM [preauth]
debug3: mm_request_receive_expect entering: type 9 [preauth]
debug3: mm_request_receive entering [preauth]
debug1: Attempting authentication for htodd. [preauth]
debug3: mm_auth_rsa_key_allowed entering [preauth]
debug3: mm_request_send entering: type 36 [preauth]
debug3: mm_request_receive entering
debug3: monitor_read: checking request 36
debug3: mm_answer_rsa_keyallowed entering
debug1: trying public RSA key file /home/htodd/openssh/regress/authorized_keys_htodd
debug1: fd 6 clearing O_NONBLOCK
debug1: /home/htodd/openssh/regress/authorized_keys_htodd, line 1: non ssh1 key syntax
debug1: matching key found: file /home/htodd/openssh/regress/authorized_keys_htodd, line 2 RSA1 fe:d0:cf:47:30:46:c1:1f:55:e5:4e:60:2a:9f:1d:3b
debug1: restore_uid: (unprivileged)
debug3: mm_request_send entering: type 37
Failed rsa for htodd from UNKNOWN port 65535 ssh1
debug3: mm_request_receive_expect entering: type 37 [preauth]
debug3: mm_request_receive entering [preauth]
debug3: mm_auth_rsa_generate_challenge entering [preauth]
debug3: mm_request_send entering: type 38 [preauth]
debug3: mm_request_receive entering
debug3: monitor_read: checking request 38
debug3: mm_answer_rsa_challenge entering
debug3: mm_answer_rsa_challenge sending reply
debug3: mm_request_send entering: type 39
debug2: monitor_read: 38 used once, disabling now
debug3: mm_request_receive_expect entering: type 39 [preauth]
debug3: mm_request_receive entering [preauth]
debug3: mm_auth_rsa_verify_response entering [preauth]
debug3: mm_request_send entering: type 40 [preauth]
debug3: mm_request_receive entering
debug3: monitor_read: checking request 40
debug3: mm_answer_rsa_response entering
debug3: mm_request_send entering: type 41
debug2: monitor_read: 40 used once, disabling now
Accepted rsa for htodd from UNKNOWN port 65535 ssh1
debug1: monitor_child_preauth: htodd has been authenticated by privileged process
debug3: mm_get_keystate: Waiting for new keys
debug3: mm_request_receive_expect entering: type 26
debug3: mm_request_receive entering
debug3: mm_get_keystate: Getting compression state
debug3: mm_get_keystate: Getting Network I/O buffers
debug3: mm_request_receive_expect entering: type 41 [preauth]
debug3: mm_request_receive entering [preauth]
debug3: mm_send_keystate: Sending ssh1 KEY+IV [preauth]
debug3: ssh1_3des_iv: Copying 3DES IV [preauth]
debug3: ssh1_3des_iv: Copying 3DES IV [preauth]
debug3: mm_send_keystate: Sending compression state [preauth]
debug3: mm_request_send entering: type 26 [preauth]
debug3: mm_send_keystate: Finished sending state [preauth]
debug1: monitor_read_log: child log fd closed
debug3: mm_share_sync: Share sync
debug3: mm_share_sync: Share sync end
User child is on pid 4961
debug2: cipher_init: set keylen (16 -> 32)
debug2: cipher_init: set keylen (16 -> 32)
debug3: ssh1_3des_iv: Installed 3DES IV
debug3: ssh1_3des_iv: Installed 3DES IV
debug2: session_new: allocate (allocated 0 max 10)
debug3: session_unused: session id 0 unused
debug1: session_new: session 0
debug1: Installing crc compensation attack detector.
debug1: Exec command 'exec sh -c 'sleep 2; exec > /dev/null 2>&1; sleep 3; exit 0''
Starting session: command for htodd from UNKNOWN port 65535
debug1: Entering interactive session.
debug2: fd 8 setting O_NONBLOCK
debug2: fd 9 setting O_NONBLOCK
debug2: fd 11 setting O_NONBLOCK
debug2: fd 7 setting O_NONBLOCK
debug2: fd 10 setting O_NONBLOCK
debug1: server_init_dispatch_13
debug1: server_init_dispatch_15
debug1: EOF received for stdin.
debug3: mm_request_receive entering
debug1: do_cleanup
FATAL:
FAIL:
trace: generate keys
FATAL: sshd_proxy broken
trace: generate keys
FATAL: sshd_proxy broken
FAIL: sshd_proxy broken
trace: generate keys
FATAL: sshd_proxy broken
trace: generate keys
FATAL: sshd_proxy broken
FAIL: sshd_proxy broken
trace: scp: simple copy remote file to local file
FATAL:
trace: scp: simple copy remote file to local file
FATAL:
FAIL:
-------------- next part --------------
trace: generate keys
FATAL: sshd_proxy broken
trace: generate keys
FATAL: sshd_proxy broken
FAIL: sshd_proxy broken
trace: scp: simple copy remote file to local file
FATAL:
trace: scp: simple copy remote file to local file
FATAL:
FAIL:
trace: test remote exit status: proto 1 status 0
debug1: Executing proxy command: exec sh /home/htodd/openssh/regress/sshd-log-wrapper.sh /home/htodd/openssh/sshd /home/htodd/openssh/regress/sshd.log -i -f /home/htodd/openssh/regress/sshd_proxy
debug3: Incorrect RSA1 identifier
debug3: Could not load "/home/htodd/openssh/regress/rsa" as a RSA1 public key
debug1: identity file /home/htodd/openssh/regress/rsa type 1
debug1: identity file /home/htodd/openssh/regress/rsa-cert type -1
debug1: identity file /home/htodd/openssh/regress/rsa1 type 0
debug1: identity file /home/htodd/openssh/regress/rsa1-cert type -1
debug1: permanently_drop_suid: 1000
debug1: Remote protocol version 1.99, remote software version OpenSSH_6.5
debug1: match: OpenSSH_6.5 pat OpenSSH* compat 0x04000000
debug1: Local version string SSH-1.5-OpenSSH_6.5
debug2: fd 6 setting O_NONBLOCK
debug2: fd 5 setting O_NONBLOCK
debug1: Waiting for server public key.
debug1: Received server public key (1024 bits) and host key (2048 bits).
debug1: Server host key: RSA1 fe:d0:cf:47:30:46:c1:1f:55:e5:4e:60:2a:9f:1d:3b
debug1: using hostkeyalias: localhost-with-alias
debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/htodd/openssh/regress/known_hosts"
debug3: load_hostkeys: found key type RSA in file /home/htodd/openssh/regress/known_hosts:1
debug2: key_type_from_name: unknown key type '2048'
debug3: key_read: missing keytype
debug3: load_hostkeys: found key type RSA1 in file /home/htodd/openssh/regress/known_hosts:2
debug3: load_hostkeys: loaded 2 keys
debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/htodd/openssh/regress/known_hosts"
debug3: load_hostkeys: found key type RSA in file /home/htodd/openssh/regress/known_hosts:1
debug2: key_type_from_name: unknown key type '2048'
debug3: key_read: missing keytype
debug3: load_hostkeys: found key type RSA1 in file /home/htodd/openssh/regress/known_hosts:2
debug3: load_hostkeys: loaded 2 keys
debug1: Host 'localhost-with-alias' is known and matches the RSA1 host key.
debug1: Found key in /home/htodd/openssh/regress/known_hosts:2
debug1: Encryption type: 3des
debug1: Sent encrypted session key.
debug2: cipher_init: set keylen (16 -> 32)
debug2: cipher_init: set keylen (16 -> 32)
debug1: Installing crc compensation attack detector.
debug1: Received encrypted confirmation.
debug1: Trying RSA authentication with key '/home/htodd/openssh/regress/rsa1'
debug1: Received RSA challenge from server.
debug1: Sending response to host key RSA challenge.
debug1: Remote: RSA authentication accepted.
debug1: RSA authentication accepted by server.
Authenticated to 127.0.0.1 (via proxy).
debug1: Sending command: exit 0
debug1: Entering interactive session.
debug2: fd 0 setting O_NONBLOCK
debug1: fd 0 clearing O_NONBLOCK
Transferred: sent 1202, received 804 bytes, in 0.0 seconds
Bytes per second: sent 78800.1, received 52708.2
debug1: Exit status 0
debug1: Executing proxy command: exec sh /home/htodd/openssh/regress/sshd-log-wrapper.sh /home/htodd/openssh/sshd /home/htodd/openssh/regress/sshd.log -i -f /home/htodd/openssh/regress/sshd_proxy
debug3: Incorrect RSA1 identifier
debug3: Could not load "/home/htodd/openssh/regress/rsa" as a RSA1 public key
debug1: permanently_drop_suid: 1000
debug1: identity file /home/htodd/openssh/regress/rsa type 1
debug1: identity file /home/htodd/openssh/regress/rsa-cert type -1
debug1: identity file /home/htodd/openssh/regress/rsa1 type 0
debug1: identity file /home/htodd/openssh/regress/rsa1-cert type -1
debug1: Remote protocol version 1.99, remote software version OpenSSH_6.5
debug1: match: OpenSSH_6.5 pat OpenSSH* compat 0x04000000
debug1: Local version string SSH-1.5-OpenSSH_6.5
debug2: fd 6 setting O_NONBLOCK
debug2: fd 5 setting O_NONBLOCK
debug1: Waiting for server public key.
debug1: Received server public key (1024 bits) and host key (2048 bits).
debug1: Server host key: RSA1 fe:d0:cf:47:30:46:c1:1f:55:e5:4e:60:2a:9f:1d:3b
debug1: using hostkeyalias: localhost-with-alias
debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/htodd/openssh/regress/known_hosts"
debug3: load_hostkeys: found key type RSA in file /home/htodd/openssh/regress/known_hosts:1
debug2: key_type_from_name: unknown key type '2048'
debug3: key_read: missing keytype
debug3: load_hostkeys: found key type RSA1 in file /home/htodd/openssh/regress/known_hosts:2
debug3: load_hostkeys: loaded 2 keys
debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/htodd/openssh/regress/known_hosts"
debug3: load_hostkeys: found key type RSA in file /home/htodd/openssh/regress/known_hosts:1
debug2: key_type_from_name: unknown key type '2048'
debug3: key_read: missing keytype
debug3: load_hostkeys: found key type RSA1 in file /home/htodd/openssh/regress/known_hosts:2
debug3: load_hostkeys: loaded 2 keys
debug1: Host 'localhost-with-alias' is known and matches the RSA1 host key.
debug1: Found key in /home/htodd/openssh/regress/known_hosts:2
debug1: Encryption type: 3des
debug1: Sent encrypted session key.
debug2: cipher_init: set keylen (16 -> 32)
debug2: cipher_init: set keylen (16 -> 32)
debug1: Installing crc compensation attack detector.
debug1: Received encrypted confirmation.
debug1: Trying RSA authentication with key '/home/htodd/openssh/regress/rsa1'
debug1: Received RSA challenge from server.
debug1: Sending response to host key RSA challenge.
debug1: Remote: RSA authentication accepted.
debug1: RSA authentication accepted by server.
Authenticated to 127.0.0.1 (via proxy).
debug1: Sending command: exec sh -c 'sleep 2; exec > /dev/null 2>&1; sleep 3; exit 0'
debug1: Entering interactive session.
debug1: Sending eof.
Killed by signal 2.
FATAL:
trace: test remote exit status: proto 1 status 0
debug1: Executing proxy command: exec sh /home/htodd/openssh/regress/sshd-log-wrapper.sh /home/htodd/openssh/sshd /home/htodd/openssh/regress/sshd.log -i -f /home/htodd/openssh/regress/sshd_proxy
debug3: Incorrect RSA1 identifier
debug3: Could not load "/home/htodd/openssh/regress/rsa" as a RSA1 public key
debug1: identity file /home/htodd/openssh/regress/rsa type 1
debug1: identity file /home/htodd/openssh/regress/rsa-cert type -1
debug1: identity file /home/htodd/openssh/regress/rsa1 type 0
debug1: identity file /home/htodd/openssh/regress/rsa1-cert type -1
debug1: permanently_drop_suid: 1000
debug1: Remote protocol version 1.99, remote software version OpenSSH_6.5
debug1: match: OpenSSH_6.5 pat OpenSSH* compat 0x04000000
debug1: Local version string SSH-1.5-OpenSSH_6.5
debug2: fd 6 setting O_NONBLOCK
debug2: fd 5 setting O_NONBLOCK
debug1: Waiting for server public key.
debug1: Received server public key (1024 bits) and host key (2048 bits).
debug1: Server host key: RSA1 fe:d0:cf:47:30:46:c1:1f:55:e5:4e:60:2a:9f:1d:3b
debug1: using hostkeyalias: localhost-with-alias
debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/htodd/openssh/regress/known_hosts"
debug3: load_hostkeys: found key type RSA in file /home/htodd/openssh/regress/known_hosts:1
debug2: key_type_from_name: unknown key type '2048'
debug3: key_read: missing keytype
debug3: load_hostkeys: found key type RSA1 in file /home/htodd/openssh/regress/known_hosts:2
debug3: load_hostkeys: loaded 2 keys
debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/htodd/openssh/regress/known_hosts"
debug3: load_hostkeys: found key type RSA in file /home/htodd/openssh/regress/known_hosts:1
debug2: key_type_from_name: unknown key type '2048'
debug3: key_read: missing keytype
debug3: load_hostkeys: found key type RSA1 in file /home/htodd/openssh/regress/known_hosts:2
debug3: load_hostkeys: loaded 2 keys
debug1: Host 'localhost-with-alias' is known and matches the RSA1 host key.
debug1: Found key in /home/htodd/openssh/regress/known_hosts:2
debug1: Encryption type: 3des
debug1: Sent encrypted session key.
debug2: cipher_init: set keylen (16 -> 32)
debug2: cipher_init: set keylen (16 -> 32)
debug1: Installing crc compensation attack detector.
debug1: Received encrypted confirmation.
debug1: Trying RSA authentication with key '/home/htodd/openssh/regress/rsa1'
debug1: Received RSA challenge from server.
debug1: Sending response to host key RSA challenge.
debug1: Remote: RSA authentication accepted.
debug1: RSA authentication accepted by server.
Authenticated to 127.0.0.1 (via proxy).
debug1: Sending command: exit 0
debug1: Entering interactive session.
debug2: fd 0 setting O_NONBLOCK
debug1: fd 0 clearing O_NONBLOCK
Transferred: sent 1202, received 804 bytes, in 0.0 seconds
Bytes per second: sent 78800.1, received 52708.2
debug1: Exit status 0
debug1: Executing proxy command: exec sh /home/htodd/openssh/regress/sshd-log-wrapper.sh /home/htodd/openssh/sshd /home/htodd/openssh/regress/sshd.log -i -f /home/htodd/openssh/regress/sshd_proxy
debug3: Incorrect RSA1 identifier
debug3: Could not load "/home/htodd/openssh/regress/rsa" as a RSA1 public key
debug1: permanently_drop_suid: 1000
debug1: identity file /home/htodd/openssh/regress/rsa type 1
debug1: identity file /home/htodd/openssh/regress/rsa-cert type -1
debug1: identity file /home/htodd/openssh/regress/rsa1 type 0
debug1: identity file /home/htodd/openssh/regress/rsa1-cert type -1
debug1: Remote protocol version 1.99, remote software version OpenSSH_6.5
debug1: match: OpenSSH_6.5 pat OpenSSH* compat 0x04000000
debug1: Local version string SSH-1.5-OpenSSH_6.5
debug2: fd 6 setting O_NONBLOCK
debug2: fd 5 setting O_NONBLOCK
debug1: Waiting for server public key.
debug1: Received server public key (1024 bits) and host key (2048 bits).
debug1: Server host key: RSA1 fe:d0:cf:47:30:46:c1:1f:55:e5:4e:60:2a:9f:1d:3b
debug1: using hostkeyalias: localhost-with-alias
debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/htodd/openssh/regress/known_hosts"
debug3: load_hostkeys: found key type RSA in file /home/htodd/openssh/regress/known_hosts:1
debug2: key_type_from_name: unknown key type '2048'
debug3: key_read: missing keytype
debug3: load_hostkeys: found key type RSA1 in file /home/htodd/openssh/regress/known_hosts:2
debug3: load_hostkeys: loaded 2 keys
debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/htodd/openssh/regress/known_hosts"
debug3: load_hostkeys: found key type RSA in file /home/htodd/openssh/regress/known_hosts:1
debug2: key_type_from_name: unknown key type '2048'
debug3: key_read: missing keytype
debug3: load_hostkeys: found key type RSA1 in file /home/htodd/openssh/regress/known_hosts:2
debug3: load_hostkeys: loaded 2 keys
debug1: Host 'localhost-with-alias' is known and matches the RSA1 host key.
debug1: Found key in /home/htodd/openssh/regress/known_hosts:2
debug1: Encryption type: 3des
debug1: Sent encrypted session key.
debug2: cipher_init: set keylen (16 -> 32)
debug2: cipher_init: set keylen (16 -> 32)
debug1: Installing crc compensation attack detector.
debug1: Received encrypted confirmation.
debug1: Trying RSA authentication with key '/home/htodd/openssh/regress/rsa1'
debug1: Received RSA challenge from server.
debug1: Sending response to host key RSA challenge.
debug1: Remote: RSA authentication accepted.
debug1: RSA authentication accepted by server.
Authenticated to 127.0.0.1 (via proxy).
debug1: Sending command: exec sh -c 'sleep 2; exec > /dev/null 2>&1; sleep 3; exit 0'
debug1: Entering interactive session.
debug1: Sending eof.
Killed by signal 2.
FATAL:
FAIL:
trace: generate keys
FATAL: sshd_proxy broken
trace: generate keys
FATAL: sshd_proxy broken
FAIL: sshd_proxy broken
trace: generate keys
FATAL: sshd_proxy broken
trace: generate keys
FATAL: sshd_proxy broken
FAIL: sshd_proxy broken
trace: scp: simple copy remote file to local file
FATAL:
trace: scp: simple copy remote file to local file
FATAL:
FAIL:
-------------- next part --------------
trace: generate keys
FATAL: sshd_proxy broken
trace: generate keys
FATAL: sshd_proxy broken
FAIL: sshd_proxy broken
trace: scp: simple copy remote file to local file
FATAL:
trace: scp: simple copy remote file to local file
FATAL:
FAIL:
trace: test remote exit status: proto 1 status 0
FATAL:
trace: test remote exit status: proto 1 status 0
FATAL:
FAIL:
trace: generate keys
FATAL: sshd_proxy broken
trace: generate keys
FATAL: sshd_proxy broken
FAIL: sshd_proxy broken
trace: generate keys
FATAL: sshd_proxy broken
trace: generate keys
FATAL: sshd_proxy broken
FAIL: sshd_proxy broken
trace: scp: simple copy remote file to local file
FATAL:
trace: scp: simple copy remote file to local file
FATAL:
FAIL:
More information about the openssh-unix-dev
mailing list