[Bug 1131] buffer_append_space: alloc not supported Error with V 4.2p1

bugzilla-daemon at mindrot.org bugzilla-daemon at mindrot.org
Thu Mar 9 05:03:11 EST 2006


http://bugzilla.mindrot.org/show_bug.cgi?id=1131





------- Comment #14 from cove at wildpackets.com  2006-03-09 05:03 -------
I believe you're right, I wasn't quite sure why turning off all the FDs instead
of just the stdin FD appeared to fix the problem, but that might explain it.

Unfortunately your patch didn't seem to work for me. The results appear to be
the same:

Without patch:
urg:~/openssh-4.3p2% sudo `pwd`/sshd -p 2200 -ddde
debug2: load_server_config: filename /usr/local/etc/sshd_config
debug2: load_server_config: done config len = 346
debug2: parse_server_config: config /usr/local/etc/sshd_config len 346
/usr/local/etc/sshd_config line 72: Unsupported option GSSAPIAuthentication
/usr/local/etc/sshd_config line 74: Unsupported option GSSAPICleanupCredentials
debug1: sshd version OpenSSH_4.3p2
debug1: private host key: #0 type 0 RSA1
debug3: Not a RSA1 key file /usr/local/etc/ssh_host_rsa_key.
debug1: read PEM private key done: type RSA
debug1: private host key: #1 type 1 RSA
debug3: Not a RSA1 key file /usr/local/etc/ssh_host_dsa_key.
debug1: read PEM private key done: type DSA
debug1: private host key: #2 type 2 DSA
debug1: rexec_argv[0]='/home/employees/cove/openssh-4.3p2/sshd'
debug1: rexec_argv[1]='-p'
debug1: rexec_argv[2]='2200'
debug1: rexec_argv[3]='-ddde'
debug2: fd 3 setting O_NONBLOCK
debug1: Bind to port 2200 on ::.
Server listening on :: port 2200.
debug2: fd 4 setting O_NONBLOCK
debug1: Bind to port 2200 on 0.0.0.0.
Bind to port 2200 on 0.0.0.0 failed: Address already in use.
Generating 768 bit RSA key.
RSA key generation complete.
debug3: fd 4 is not O_NONBLOCK
debug1: Server will not fork when running in debugging mode.
debug3: send_rexec_state: entering fd = 7 config len 346
debug3: ssh_msg_send: type 0
debug3: send_rexec_state: done
debug1: rexec start in 4 out 4 newsock 4 pipe -1 sock 7
debug3: recv_rexec_state: entering fd = 5
debug3: ssh_msg_recv entering
debug3: recv_rexec_state: done
debug2: parse_server_config: config rexec len 346
rexec line 72: Unsupported option GSSAPIAuthentication
rexec line 74: Unsupported option GSSAPICleanupCredentials
debug1: sshd version OpenSSH_4.3p2
debug1: private host key: #0 type 0 RSA1
debug3: Not a RSA1 key file /usr/local/etc/ssh_host_rsa_key.
debug1: read PEM private key done: type RSA
debug1: private host key: #1 type 1 RSA
debug3: Not a RSA1 key file /usr/local/etc/ssh_host_dsa_key.
debug1: read PEM private key done: type DSA
debug1: private host key: #2 type 2 DSA
debug1: inetd sockets after dupping: 3, 3
debug3: Normalising mapped IPv4 in IPv6 address
Connection from 10.4.7.131 port 45020
debug1: Client protocol version 2.0; client software version cryptlib
debug1: no match: cryptlib
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-1.99-OpenSSH_4.3
debug2: fd 3 setting O_NONBLOCK
debug1: list_hostkey_types: ssh-rsa,ssh-dss
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug2: kex_parse_kexinit:
diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
debug2: kex_parse_kexinit:
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc at lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
debug2: kex_parse_kexinit:
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc at lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
debug2: kex_parse_kexinit:
hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit:
hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none,zlib at openssh.com
debug2: kex_parse_kexinit: none,zlib at openssh.com
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: first_kex_follows 0 
debug2: kex_parse_kexinit: reserved 0 
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1
debug2: kex_parse_kexinit: ssh-rsa
debug2: kex_parse_kexinit: 3des-cbc
debug2: kex_parse_kexinit: 3des-cbc
debug2: kex_parse_kexinit: hmac-sha1
debug2: kex_parse_kexinit: hmac-sha1
debug2: kex_parse_kexinit: none
debug2: kex_parse_kexinit: none
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: first_kex_follows 0 
debug2: kex_parse_kexinit: reserved 0 
debug2: mac_init: found hmac-sha1
debug1: kex: client->server 3des-cbc hmac-sha1 none
debug2: mac_init: found hmac-sha1
debug1: kex: server->client 3des-cbc hmac-sha1 none
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST_OLD received
debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent
debug2: dh_gen_key: priv key bits set: 204/384
debug2: bits set: 539/1024
debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT
debug2: bits set: 522/1024
debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent
debug2: kex_derive_keys
debug2: set_newkeys: mode 1
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug2: set_newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: KEX done
debug1: userauth-request for user cove service ssh-connection method password
debug1: attempt 0 failures 0
debug2: input_userauth_request: setting up authctxt for cove
debug1: PAM: initializing for "cove"
debug3: Normalising mapped IPv4 in IPv6 address
debug3: Trying to reverse map address 10.4.7.131.
debug1: PAM: setting PAM_RHOST to "urg.wildpackets.com"
debug1: PAM: setting PAM_TTY to "ssh"
debug2: input_userauth_request: try method password
debug3: PAM: sshpam_passwd_conv called with 1 messages
debug1: PAM: password authentication accepted for cove
debug1: do_pam_account: called
debug3: PAM: do_pam_account pam_acct_mgmt = 0 (Success)
debug3: Normalising mapped IPv4 in IPv6 address
Accepted password for cove from 10.4.7.131 port 45020 ssh2
debug1: Entering interactive session for SSH2.
debug2: fd 6 setting O_NONBLOCK
debug2: fd 7 setting O_NONBLOCK
debug1: server_init_dispatch_20
debug1: server_input_channel_open: ctype session rchan 0 win 2147483647 max
16384
debug1: input_session_request
debug1: channel 0: new [server-session]
debug1: session_new: init
debug1: session_new: session 0
debug1: session_open: channel 0
debug1: session_open: session 0: link with channel 0
debug1: server_input_channel_open: confirm session
debug1: server_input_channel_req: channel 0 request shell reply 0
debug1: session_by_channel: session 0 channel 0
debug1: session_input_channel_req: session 0 req shell
debug1: PAM: establishing credentials
debug2: fd 9 setting O_NONBLOCK
debug3: fd 9 is O_NONBLOCK
debug2: fd 11 setting O_NONBLOCK
debug2: channel 0: read 30 from efd 11
debug2: channel 0: rwin 2147483647 elen 30 euse 1
debug2: channel 0: sent ext data 30
debug2: channel 0: read 41 from efd 11
debug2: channel 0: rwin 2147483617 elen 41 euse 1
debug2: channel 0: sent ext data 41
debug2: channel 0: read 40 from efd 11
debug2: channel 0: rwin 2147483576 elen 40 euse 1
debug2: channel 0: sent ext data 40
debug2: channel 0: read 49 from efd 11
debug2: channel 0: rwin 2147483536 elen 49 euse 1
debug2: channel 0: sent ext data 49
debug2: channel 0: read 13 from efd 11
debug2: channel 0: rwin 2147483487 elen 13 euse 1
debug2: channel 0: sent ext data 13
debug2: channel 0: read 12 from efd 11
debug2: channel 0: rwin 2147483474 elen 12 euse 1
debug2: channel 0: sent ext data 12
debug2: channel 0: read 15 from efd 11
debug2: channel 0: rwin 2147483462 elen 15 euse 1
debug2: channel 0: sent ext data 15
debug2: channel 0: read 28 from efd 11
debug2: channel 0: rwin 2147483447 elen 28 euse 1
debug2: channel 0: sent ext data 28
debug2: channel 0: read 52 from efd 11
debug2: channel 0: rwin 2147483419 elen 52 euse 1
debug2: channel 0: sent ext data 52
debug2: channel 0: read 190 from efd 11
debug2: channel 0: rwin 2147483367 elen 190 euse 1
debug2: channel 0: sent ext data 190
Connection closed by 10.4.7.131
debug1: channel 0: free: server-session, nchannels 1
debug3: channel 0: status: The following connections are open:
  #0 server-session (t4 r0 i0/0 o0/0 fd 9/9 cfd -1)

debug3: channel 0: close_fds r 9 w 9 e 11 c -1
debug1: session_close: session 0 pid 11585
debug1: do_cleanup
debug1: PAM: cleanup
debug3: PAM: sshpam_thread_cleanup entering
Closing connection to 10.4.7.131
debug1: PAM: cleanup

With limit remote maxpacket patch:
urg:~/openssh-4.3p2% sudo `pwd`/sshd -p 2200 -ddde
debug2: load_server_config: filename /usr/local/etc/sshd_config
debug2: load_server_config: done config len = 346
debug2: parse_server_config: config /usr/local/etc/sshd_config len 346
/usr/local/etc/sshd_config line 72: Unsupported option GSSAPIAuthentication
/usr/local/etc/sshd_config line 74: Unsupported option GSSAPICleanupCredentials
debug1: sshd version OpenSSH_4.3p2
debug1: private host key: #0 type 0 RSA1
debug3: Not a RSA1 key file /usr/local/etc/ssh_host_rsa_key.
debug1: read PEM private key done: type RSA
debug1: private host key: #1 type 1 RSA
debug3: Not a RSA1 key file /usr/local/etc/ssh_host_dsa_key.
debug1: read PEM private key done: type DSA
debug1: private host key: #2 type 2 DSA
debug1: rexec_argv[0]='/home/employees/cove/openssh-4.3p2/sshd'
debug1: rexec_argv[1]='-p'
debug1: rexec_argv[2]='2200'
debug1: rexec_argv[3]='-ddde'
debug2: fd 3 setting O_NONBLOCK
debug1: Bind to port 2200 on ::.
Server listening on :: port 2200.
debug2: fd 4 setting O_NONBLOCK
debug1: Bind to port 2200 on 0.0.0.0.
Bind to port 2200 on 0.0.0.0 failed: Address already in use.
Generating 768 bit RSA key.
RSA key generation complete.
debug3: fd 4 is not O_NONBLOCK
debug1: Server will not fork when running in debugging mode.
debug3: send_rexec_state: entering fd = 7 config len 346
debug3: ssh_msg_send: type 0
debug3: send_rexec_state: done
debug1: rexec start in 4 out 4 newsock 4 pipe -1 sock 7
debug3: recv_rexec_state: entering fd = 5
debug3: ssh_msg_recv entering
debug3: recv_rexec_state: done
debug2: parse_server_config: config rexec len 346
rexec line 72: Unsupported option GSSAPIAuthentication
rexec line 74: Unsupported option GSSAPICleanupCredentials
debug1: sshd version OpenSSH_4.3p2
debug1: private host key: #0 type 0 RSA1
debug3: Not a RSA1 key file /usr/local/etc/ssh_host_rsa_key.
debug1: read PEM private key done: type RSA
debug1: private host key: #1 type 1 RSA
debug3: Not a RSA1 key file /usr/local/etc/ssh_host_dsa_key.
debug1: read PEM private key done: type DSA
debug1: private host key: #2 type 2 DSA
debug1: inetd sockets after dupping: 3, 3
debug3: Normalising mapped IPv4 in IPv6 address
Connection from 10.4.7.131 port 45165
debug1: Client protocol version 2.0; client software version cryptlib
debug1: no match: cryptlib
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-1.99-OpenSSH_4.3
debug2: fd 3 setting O_NONBLOCK
debug1: list_hostkey_types: ssh-rsa,ssh-dss
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug2: kex_parse_kexinit:
diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
debug2: kex_parse_kexinit:
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc at lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
debug2: kex_parse_kexinit:
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc at lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
debug2: kex_parse_kexinit:
hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit:
hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none,zlib at openssh.com
debug2: kex_parse_kexinit: none,zlib at openssh.com
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: first_kex_follows 0 
debug2: kex_parse_kexinit: reserved 0 
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1
debug2: kex_parse_kexinit: ssh-rsa
debug2: kex_parse_kexinit: 3des-cbc
debug2: kex_parse_kexinit: 3des-cbc
debug2: kex_parse_kexinit: hmac-sha1
debug2: kex_parse_kexinit: hmac-sha1
debug2: kex_parse_kexinit: none
debug2: kex_parse_kexinit: none
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: first_kex_follows 0 
debug2: kex_parse_kexinit: reserved 0 
debug2: mac_init: found hmac-sha1
debug1: kex: client->server 3des-cbc hmac-sha1 none
debug2: mac_init: found hmac-sha1
debug1: kex: server->client 3des-cbc hmac-sha1 none
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST_OLD received
debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent
debug2: dh_gen_key: priv key bits set: 190/384
debug2: bits set: 530/1024
debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT
debug2: bits set: 492/1024
debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent
debug2: kex_derive_keys
debug2: set_newkeys: mode 1
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug2: set_newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: KEX done
debug1: userauth-request for user cove service ssh-connection method password
debug1: attempt 0 failures 0
debug2: input_userauth_request: setting up authctxt for cove
debug1: PAM: initializing for "cove"
debug3: Normalising mapped IPv4 in IPv6 address
debug3: Trying to reverse map address 10.4.7.131.
debug1: PAM: setting PAM_RHOST to "urg.wildpackets.com"
debug1: PAM: setting PAM_TTY to "ssh"
debug2: input_userauth_request: try method password
debug3: PAM: sshpam_passwd_conv called with 1 messages
debug1: PAM: password authentication accepted for cove
debug1: do_pam_account: called
debug3: PAM: do_pam_account pam_acct_mgmt = 0 (Success)
debug3: Normalising mapped IPv4 in IPv6 address
Accepted password for cove from 10.4.7.131 port 45165 ssh2
debug1: Entering interactive session for SSH2.
debug2: fd 6 setting O_NONBLOCK
debug2: fd 7 setting O_NONBLOCK
debug1: server_init_dispatch_20
debug1: server_input_channel_open: ctype session rchan 0 win 2147483647 max
16384
debug1: input_session_request
debug1: channel 0: new [server-session]
debug1: session_new: init
debug1: session_new: session 0
debug1: session_open: channel 0
debug1: session_open: session 0: link with channel 0
debug1: server_input_channel_open: confirm session
debug1: server_input_channel_req: channel 0 request shell reply 0
debug1: session_by_channel: session 0 channel 0
debug1: session_input_channel_req: session 0 req shell
debug1: PAM: establishing credentials
debug2: fd 9 setting O_NONBLOCK
debug3: fd 9 is O_NONBLOCK
debug2: fd 11 setting O_NONBLOCK
debug2: channel 0: read 30 from efd 11
debug2: channel 0: rwin 2147483647 elen 30 euse 1
debug2: channel 0: sent ext data 30
debug2: channel 0: read 41 from efd 11
debug2: channel 0: rwin 2147483617 elen 41 euse 1
debug2: channel 0: sent ext data 41
debug2: channel 0: read 40 from efd 11
debug2: channel 0: rwin 2147483576 elen 40 euse 1
debug2: channel 0: sent ext data 40
debug2: channel 0: read 49 from efd 11
debug2: channel 0: rwin 2147483536 elen 49 euse 1
debug2: channel 0: sent ext data 49
debug2: channel 0: read 13 from efd 11
debug2: channel 0: rwin 2147483487 elen 13 euse 1
debug2: channel 0: sent ext data 13
debug2: channel 0: read 12 from efd 11
debug2: channel 0: rwin 2147483474 elen 12 euse 1
debug2: channel 0: sent ext data 12
debug2: channel 0: read 285 from efd 11
debug2: channel 0: rwin 2147483462 elen 285 euse 1
debug2: channel 0: sent ext data 285
Connection closed by 10.4.7.131
debug1: channel 0: free: server-session, nchannels 1
debug3: channel 0: status: The following connections are open:
  #0 server-session (t4 r0 i0/0 o0/0 fd 9/9 cfd -1)

debug3: channel 0: close_fds r 9 w 9 e 11 c -1
debug1: session_close: session 0 pid 16742
debug1: do_cleanup
debug1: PAM: cleanup
debug3: PAM: sshpam_thread_cleanup entering
Closing connection to 10.4.7.131
debug1: PAM: cleanup




------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.




More information about the openssh-bugs mailing list