sftp error on LynxOs

mouring at etoh.eviladmin.org mouring at etoh.eviladmin.org
Fri Sep 28 06:42:37 EST 2001


do a:

ssh site /bin/true

does ssh give you any banners or anything running that command.. if so
subsystems will fail.

- Ben

On Thu, 27 Sep 2001, Deepa Nemmili Veeravalli wrote:

> I have the debug output from the server side below.
> Any help or pointer will be greatly appreciated as I have been blocked with
> this.
>
>
> debug1: Server will not fork when running in debugging mode.
> Connection from 10.0.0.11 port 1020
> debug1: Client protocol version 2.0; client software version OpenSSH_2.3.0p1
> debug1: match: OpenSSH_2.3.0p1 pat ^OpenSSH_2\.3\.0
> Enabling compatibility mode for protocol 2.0
> debug1: Local version string SSH-1.99-OpenSSH_2.9p1
> debug2: Original cipher proposal:
> aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,r
> ijndael128-cbc,rijndael192-cbc,rijndael256-cbc,rijndael-cbc at lysator.liu.se
> debug2: Compat cipher proposal: 3des-cbc,blowfish-cbc,cast128-cbc,arcfour
> debug2: Original cipher proposal:
> aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,r
> ijndael128-cbc,rijndael192-cbc,rijndael256-cbc,rijndael-cbc at lysator.liu.se
> debug2: Compat cipher proposal: 3des-cbc,blowfish-cbc,cast128-cbc,arcfour
> debug1: list_hostkey_types: ssh-rsa,ssh-dss
> debug1: SSH2_MSG_KEXINIT sent
> debug1: SSH2_MSG_KEXINIT received
> debug2: kex_parse_kexinit:
> diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
> debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
> debug2: kex_parse_kexinit: 3des-cbc,blowfish-cbc,cast128-cbc,arcfour
> debug2: kex_parse_kexinit: 3des-cbc,blowfish-cbc,cast128-cbc,arcfour
> debug2: kex_parse_kexinit:
> hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hm
> ac-md5-96
> debug2: kex_parse_kexinit:
> hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hm
> ac-md5-96
> debug2: kex_parse_kexinit: none,zlib
> debug2: kex_parse_kexinit: none,zlib
> debug2: kex_parse_kexinit:
> debug2: kex_parse_kexinit:
> debug2: kex_parse_kexinit: first_kex_follows 0
> debug2: kex_parse_kexinit: reserved 0
> debug2: kex_parse_kexinit:
> diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
> debug2: kex_parse_kexinit: ssh-dss
> debug2: kex_parse_kexinit:
> 3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes128-cbc,aes192-cbc,aes256-cbc,r
> ijndael128-cbc,rijndael192-cbc,rijndael256-cbc,rijndael-cbc at lysator.liu.se
> debug2: kex_parse_kexinit:
> 3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes128-cbc,aes192-cbc,aes256-cbc,r
> ijndael128-cbc,rijndael192-cbc,rijndael256-cbc,rijndael-cbc at lysator.liu.se
> debug2: kex_parse_kexinit: hmac-sha1,hmac-md5,hmac-ripemd160 at openssh.com
> debug2: kex_parse_kexinit: hmac-sha1,hmac-md5,hmac-ripemd160 at openssh.com
> debug2: kex_parse_kexinit: none
> debug2: kex_parse_kexinit: none
> debug2: kex_parse_kexinit:
> debug2: kex_parse_kexinit:
> debug2: kex_parse_kexinit: first_kex_follows 0
> debug2: kex_parse_kexinit: reserved 0
> debug2: mac_init: found hmac-sha1
> debug1: kex: server->client 3des-cbc hmac-sha1 none
> debug1: SSH2_MSG_KEX_DH_GEX_REQUEST_OLD received
> debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent
> debug1: dh_gen_key: priv key bits set: 204/384
> debug1: bits set: 1037/2049
> debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT
> debug1: bits set: 967/2049
> debug1: sig size 20 20
> debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent
> debug1: kex_derive_keys
> debug1: newkeys: mode 1
> debug1: SSH2_MSG_NEWKEYS sent
> debug1: waiting for SSH2_MSG_NEWKEYS
> debug1: newkeys: mode 0
> debug1: SSH2_MSG_NEWKEYS received
> debug1: KEX done
> debug1: userauth-request for user telica service ssh-connection method none
> debug1: attempt 0 failures 0
> debug2: input_userauth_request: setting up authctxt for telica
> debug2: input_userauth_request: try method none
> Failed none for telica from 10.0.0.11 port 1020 ssh2
> debug1: userauth-request for user telica service ssh-connection method
> publickey
> debug1: attempt 1 failures 1
> debug2: input_userauth_request: try method publickey
> debug1: temporarily_use_uid: 604/500 (e=0)
> debug1: matching key found: file /home/telica/.ssh/authorized_keys2, line 1
> debug1: restore_uid
> debug1: len 55 datafellows 53376
> debug1: ssh_dss_verify: signature correct
> debug2: userauth_pubkey: authenticated 1 pkalg ssh-dss
> Accepted publickey for telica from 10.0.0.11 port 1020 ssh2
> debug1: Entering interactive session for SSH2.
> debug1: server_init_dispatch_20
> debug1: server_input_channel_open: ctype session rchan 0 win 65536 max 32768
> debug1: input_session_request
> debug1: channel 0: new [server-session]
> debug1: session_new: init
> debug1: session_new: session 0
> debug1: session_open: channel 0
> debug1: session_open: session 0: link with channel 0
> debug1: server_input_channel_open: confirm session
> debug2: callback start
> debug1: session_by_channel: session 0 channel 0
> debug1: session_input_channel_req: session 0 channel 0 request x11-req reply
> 0
> debug1: X11 forwarding disabled in server configuration file.
> debug2: callback done
> debug2: callback start
> debug1: session_by_channel: session 0 channel 0
> debug1: session_input_channel_req: session 0 channel 0 request exec reply 0
> debug1: fd 6 setting O_NONBLOCK
> debug1: fd 6 IS O_NONBLOCK
> debug1: fd 11 setting O_NONBLOCK
> debug2: callback done
> debug2: channel 0: read 195 from efd 11
> debug2: channel 0: rwin 65536 elen 195 euse 1
> debug2: channel 0: sent ext data 195
> debug1: Received SIGCHLD.
> debug1: session_by_pid: pid 32
> debug1: session_exit_message: session 0 channel 0 pid 32
> debug1: session_exit_message: release channel 0
> debug1: channel 0: write failed
> debug1: channel 0: output open -> closed
> debug1: channel 0: close_write
> debug1: session_free: session 0 pid 32
> debug1: channel 0: read<=0 rfd 6 len 0
> debug1: channel 0: read failed
> debug1: channel 0: input open -> drain
> debug1: channel 0: close_read
> debug1: channel 0: input: no drain shortcut
> debug1: channel 0: ibuf empty
> debug1: channel 0: input drain -> closed
> debug1: channel 0: send eof
> debug2: channel 0: read 61 from efd 11
> debug2: channel 0: active efd: 11 len 61 type read
> debug2: channel 0: rwin 65341 elen 61 euse 1
> debug2: channel 0: sent ext data 61
> debug1: channel 0: send close
> debug2: channel 0: read 0 from efd 11
> debug2: channel 0: closing read-efd 11
> debug2: channel 0: no data after CLOSE
> Connection closed by remote host.
> Closing connection to 10.0.0.11
> debug1: writing PRNG seed to file //.ssh/prng_seed
>
> -----Original Message-----
> From: Deepa Nemmili Veeravalli [mailto:dveeravalli at telica.com]
> Sent: Thursday, September 27, 2001 3:26 PM
> To: openssh-unix-dev at mindrot.org
> Subject: sftp error on LynxOs
>
>
> I am trying to initiate an sftp session from a Linux (Redhat) to a LynxOs
> machine (where i have ported opnessh-2.9p1) and configured without PAM
> support (as I was not able to find PAM version for LynxOS operating system)
>
> I get the following error:
> $ sftp -P /home/telica -l telica -v ben
> select: Bad file descriptor
> read: Input/output error
> sftp>
>
>
> Can somebody help me asap on this?
>
> Thanks,Deepa.
>




More information about the openssh-unix-dev mailing list