On Thu, 23 Jan 2014, Darren Tucker wrote: > On Thu, Jan 23, 2014 at 12:13 PM, Hisashi T Fujinaka <htodd at twofifty.com> wrote: >> #1 0x00007f7ff62a11f8 in strnvis (mbdst=<optimized out>, >> dlen=140187732525536, mbsrc=<optimized out>, flags=<optimized out>) >> at /usr/src/lib/libc/gen/vis.c:655 > > strnvis? interesting. Could you please try: > > ../../configure --with-cflags=-DBROKEN_STRNVIS && make clean && make tests I gave up on the file copy and here are the three fail logs. -- Hisashi T Fujinaka - htodd at twofifty.com BSEE(6/86) + BSChem(3/95) + BAEnglish(8/95) + MSCS(8/03) + $2.50 = latte -------------- next part -------------- trace: generate keys FATAL: sshd_proxy broken trace: generate keys FATAL: sshd_proxy broken FAIL: sshd_proxy broken trace: scp: simple copy remote file to local file FATAL: trace: scp: simple copy remote file to local file FATAL: FAIL: trace: test remote exit status: proto 1 status 0 debug1: inetd sockets after dupping: 4, 5 Connection from UNKNOWN port 65535 on UNKNOWN port 65535 debug1: Client protocol version 1.5; client software version OpenSSH_6.5 debug1: match: OpenSSH_6.5 pat OpenSSH* compat 0x04000000 debug1: Local version string SSH-1.99-OpenSSH_6.5 Generating 1024 bit RSA key. RSA key generation complete. debug2: fd 4 setting O_NONBLOCK debug2: fd 5 setting O_NONBLOCK debug2: Network child is on pid 4361 debug3: preauth child monitor started debug1: Sent 1024 bit server key and 2048 bit host key. [preauth] debug1: Encryption type: 3des [preauth] debug3: mm_request_send entering: type 32 [preauth] debug3: mm_request_receive entering debug3: monitor_read: checking request 32 debug3: mm_request_send entering: type 33 debug2: monitor_read: 32 used once, disabling now debug3: mm_request_receive_expect entering: type 33 [preauth] debug3: mm_request_receive entering [preauth] debug3: mm_ssh1_session_id entering [preauth] debug3: mm_request_send entering: type 34 [preauth] debug3: mm_request_receive entering debug3: monitor_read: checking request 34 debug3: mm_answer_sessid entering debug2: monitor_read: 34 used once, disabling now debug2: cipher_init: set keylen (16 -> 32) [preauth] debug2: cipher_init: set keylen (16 -> 32) [preauth] debug1: Received session key; encryption turned on. [preauth] debug1: Installing crc compensation attack detector. [preauth] debug3: mm_getpwnamallow entering [preauth] debug3: mm_request_send entering: type 8 [preauth] debug3: mm_request_receive entering debug3: monitor_read: checking request 8 debug3: mm_answer_pwnamallow debug2: parse_server_config: config reprocess config len 405 debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1 debug3: mm_request_send entering: type 9 debug2: monitor_read: 8 used once, disabling now debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM [preauth] debug3: mm_request_receive_expect entering: type 9 [preauth] debug3: mm_request_receive entering [preauth] debug1: Attempting authentication for htodd. [preauth] debug3: mm_auth_rsa_key_allowed entering [preauth] debug3: mm_request_send entering: type 36 [preauth] debug3: mm_request_receive entering debug3: monitor_read: checking request 36 debug3: mm_answer_rsa_keyallowed entering debug1: trying public RSA key file /home/htodd/openssh/regress/authorized_keys_htodd debug1: fd 6 clearing O_NONBLOCK debug1: /home/htodd/openssh/regress/authorized_keys_htodd, line 1: non ssh1 key syntax debug1: matching key found: file /home/htodd/openssh/regress/authorized_keys_htodd, line 2 RSA1 fe:d0:cf:47:30:46:c1:1f:55:e5:4e:60:2a:9f:1d:3b debug1: restore_uid: (unprivileged) debug3: mm_request_send entering: type 37 Failed rsa for htodd from UNKNOWN port 65535 ssh1 debug3: mm_request_receive_expect entering: type 37 [preauth] debug3: mm_request_receive entering [preauth] debug3: mm_auth_rsa_generate_challenge entering [preauth] debug3: mm_request_send entering: type 38 [preauth] debug3: mm_request_receive entering debug3: monitor_read: checking request 38 debug3: mm_answer_rsa_challenge entering debug3: mm_answer_rsa_challenge sending reply debug3: mm_request_send entering: type 39 debug2: monitor_read: 38 used once, disabling now debug3: mm_request_receive_expect entering: type 39 [preauth] debug3: mm_request_receive entering [preauth] debug3: mm_auth_rsa_verify_response entering [preauth] debug3: mm_request_send entering: type 40 [preauth] debug3: mm_request_receive entering debug3: monitor_read: checking request 40 debug3: mm_answer_rsa_response entering debug3: mm_request_send entering: type 41 debug2: monitor_read: 40 used once, disabling now Accepted rsa for htodd from UNKNOWN port 65535 ssh1 debug1: monitor_child_preauth: htodd has been authenticated by privileged process debug3: mm_get_keystate: Waiting for new keys debug3: mm_request_receive_expect entering: type 26 debug3: mm_request_receive entering debug3: mm_get_keystate: Getting compression state debug3: mm_get_keystate: Getting Network I/O buffers debug3: mm_request_receive_expect entering: type 41 [preauth] debug3: mm_request_receive entering [preauth] debug3: mm_send_keystate: Sending ssh1 KEY+IV [preauth] debug3: ssh1_3des_iv: Copying 3DES IV [preauth] debug3: ssh1_3des_iv: Copying 3DES IV [preauth] debug3: mm_send_keystate: Sending compression state [preauth] debug3: mm_request_send entering: type 26 [preauth] debug3: mm_send_keystate: Finished sending state [preauth] debug1: monitor_read_log: child log fd closed debug3: mm_share_sync: Share sync debug3: mm_share_sync: Share sync end User child is on pid 2619 debug2: cipher_init: set keylen (16 -> 32) debug2: cipher_init: set keylen (16 -> 32) debug3: ssh1_3des_iv: Installed 3DES IV debug3: ssh1_3des_iv: Installed 3DES IV debug2: session_new: allocate (allocated 0 max 10) debug3: session_unused: session id 0 unused debug1: session_new: session 0 debug1: Installing crc compensation attack detector. debug1: Exec command 'exit 0' Starting session: command for htodd from UNKNOWN port 65535 debug1: Entering interactive session. debug2: fd 8 setting O_NONBLOCK debug2: fd 9 setting O_NONBLOCK debug2: fd 11 setting O_NONBLOCK debug2: fd 7 setting O_NONBLOCK debug2: fd 10 setting O_NONBLOCK debug1: server_init_dispatch_13 debug1: server_init_dispatch_15 debug2: notify_done: reading debug1: End of interactive session; stdin 0, stdout (read 0, sent 0), stderr 0 bytes. debug1: Command exited with status 0. debug3: mm_request_receive entering debug1: do_cleanup debug1: inetd sockets after dupping: 4, 5 Connection from UNKNOWN port 65535 on UNKNOWN port 65535 debug1: Client protocol version 1.5; client software version OpenSSH_6.5 debug1: match: OpenSSH_6.5 pat OpenSSH* compat 0x04000000 debug1: Local version string SSH-1.99-OpenSSH_6.5 Generating 1024 bit RSA key. RSA key generation complete. debug2: fd 4 setting O_NONBLOCK debug2: fd 5 setting O_NONBLOCK debug2: Network child is on pid 3499 debug3: preauth child monitor started debug1: Sent 1024 bit server key and 2048 bit host key. [preauth] debug1: Encryption type: 3des [preauth] debug3: mm_request_send entering: type 32 [preauth] debug3: mm_request_receive entering debug3: monitor_read: checking request 32 debug3: mm_request_send entering: type 33 debug2: monitor_read: 32 used once, disabling now debug3: mm_request_receive_expect entering: type 33 [preauth] debug3: mm_request_receive entering [preauth] debug3: mm_ssh1_session_id entering [preauth] debug3: mm_request_send entering: type 34 [preauth] debug3: mm_request_receive entering debug3: monitor_read: checking request 34 debug3: mm_answer_sessid entering debug2: monitor_read: 34 used once, disabling now debug2: cipher_init: set keylen (16 -> 32) [preauth] debug2: cipher_init: set keylen (16 -> 32) [preauth] debug1: Received session key; encryption turned on. [preauth] debug1: Installing crc compensation attack detector. [preauth] debug3: mm_getpwnamallow entering [preauth] debug3: mm_request_send entering: type 8 [preauth] debug3: mm_request_receive entering debug3: monitor_read: checking request 8 debug3: mm_answer_pwnamallow debug2: parse_server_config: config reprocess config len 405 debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1 debug3: mm_request_send entering: type 9 debug2: monitor_read: 8 used once, disabling now debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM [preauth] debug3: mm_request_receive_expect entering: type 9 [preauth] debug3: mm_request_receive entering [preauth] debug1: Attempting authentication for htodd. [preauth] debug3: mm_auth_rsa_key_allowed entering [preauth] debug3: mm_request_send entering: type 36 [preauth] debug3: mm_request_receive entering debug3: monitor_read: checking request 36 debug3: mm_answer_rsa_keyallowed entering debug1: trying public RSA key file /home/htodd/openssh/regress/authorized_keys_htodd debug1: fd 6 clearing O_NONBLOCK debug1: /home/htodd/openssh/regress/authorized_keys_htodd, line 1: non ssh1 key syntax debug1: matching key found: file /home/htodd/openssh/regress/authorized_keys_htodd, line 2 RSA1 fe:d0:cf:47:30:46:c1:1f:55:e5:4e:60:2a:9f:1d:3b debug1: restore_uid: (unprivileged) debug3: mm_request_send entering: type 37 Failed rsa for htodd from UNKNOWN port 65535 ssh1 debug3: mm_request_receive_expect entering: type 37 [preauth] debug3: mm_request_receive entering [preauth] debug3: mm_auth_rsa_generate_challenge entering [preauth] debug3: mm_request_send entering: type 38 [preauth] debug3: mm_request_receive entering debug3: monitor_read: checking request 38 debug3: mm_answer_rsa_challenge entering debug3: mm_answer_rsa_challenge sending reply debug3: mm_request_send entering: type 39 debug2: monitor_read: 38 used once, disabling now debug3: mm_request_receive_expect entering: type 39 [preauth] debug3: mm_request_receive entering [preauth] debug3: mm_auth_rsa_verify_response entering [preauth] debug3: mm_request_send entering: type 40 [preauth] debug3: mm_request_receive entering debug3: monitor_read: checking request 40 debug3: mm_answer_rsa_response entering debug3: mm_request_send entering: type 41 debug2: monitor_read: 40 used once, disabling now Accepted rsa for htodd from UNKNOWN port 65535 ssh1 debug1: monitor_child_preauth: htodd has been authenticated by privileged process debug3: mm_get_keystate: Waiting for new keys debug3: mm_request_receive_expect entering: type 26 debug3: mm_request_receive entering debug3: mm_get_keystate: Getting compression state debug3: mm_get_keystate: Getting Network I/O buffers debug3: mm_request_receive_expect entering: type 41 [preauth] debug3: mm_request_receive entering [preauth] debug3: mm_send_keystate: Sending ssh1 KEY+IV [preauth] debug3: ssh1_3des_iv: Copying 3DES IV [preauth] debug3: ssh1_3des_iv: Copying 3DES IV [preauth] debug3: mm_send_keystate: Sending compression state [preauth] debug3: mm_request_send entering: type 26 [preauth] debug3: mm_send_keystate: Finished sending state [preauth] debug1: monitor_read_log: child log fd closed debug3: mm_share_sync: Share sync debug3: mm_share_sync: Share sync end User child is on pid 4961 debug2: cipher_init: set keylen (16 -> 32) debug2: cipher_init: set keylen (16 -> 32) debug3: ssh1_3des_iv: Installed 3DES IV debug3: ssh1_3des_iv: Installed 3DES IV debug2: session_new: allocate (allocated 0 max 10) debug3: session_unused: session id 0 unused debug1: session_new: session 0 debug1: Installing crc compensation attack detector. debug1: Exec command 'exec sh -c 'sleep 2; exec > /dev/null 2>&1; sleep 3; exit 0'' Starting session: command for htodd from UNKNOWN port 65535 debug1: Entering interactive session. debug2: fd 8 setting O_NONBLOCK debug2: fd 9 setting O_NONBLOCK debug2: fd 11 setting O_NONBLOCK debug2: fd 7 setting O_NONBLOCK debug2: fd 10 setting O_NONBLOCK debug1: server_init_dispatch_13 debug1: server_init_dispatch_15 debug1: EOF received for stdin. debug3: mm_request_receive entering debug1: do_cleanup FATAL: trace: test remote exit status: proto 1 status 0 debug1: inetd sockets after dupping: 4, 5 Connection from UNKNOWN port 65535 on UNKNOWN port 65535 debug1: Client protocol version 1.5; client software version OpenSSH_6.5 debug1: match: OpenSSH_6.5 pat OpenSSH* compat 0x04000000 debug1: Local version string SSH-1.99-OpenSSH_6.5 Generating 1024 bit RSA key. RSA key generation complete. debug2: fd 4 setting O_NONBLOCK debug2: fd 5 setting O_NONBLOCK debug2: Network child is on pid 4361 debug3: preauth child monitor started debug1: Sent 1024 bit server key and 2048 bit host key. [preauth] debug1: Encryption type: 3des [preauth] debug3: mm_request_send entering: type 32 [preauth] debug3: mm_request_receive entering debug3: monitor_read: checking request 32 debug3: mm_request_send entering: type 33 debug2: monitor_read: 32 used once, disabling now debug3: mm_request_receive_expect entering: type 33 [preauth] debug3: mm_request_receive entering [preauth] debug3: mm_ssh1_session_id entering [preauth] debug3: mm_request_send entering: type 34 [preauth] debug3: mm_request_receive entering debug3: monitor_read: checking request 34 debug3: mm_answer_sessid entering debug2: monitor_read: 34 used once, disabling now debug2: cipher_init: set keylen (16 -> 32) [preauth] debug2: cipher_init: set keylen (16 -> 32) [preauth] debug1: Received session key; encryption turned on. [preauth] debug1: Installing crc compensation attack detector. [preauth] debug3: mm_getpwnamallow entering [preauth] debug3: mm_request_send entering: type 8 [preauth] debug3: mm_request_receive entering debug3: monitor_read: checking request 8 debug3: mm_answer_pwnamallow debug2: parse_server_config: config reprocess config len 405 debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1 debug3: mm_request_send entering: type 9 debug2: monitor_read: 8 used once, disabling now debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM [preauth] debug3: mm_request_receive_expect entering: type 9 [preauth] debug3: mm_request_receive entering [preauth] debug1: Attempting authentication for htodd. [preauth] debug3: mm_auth_rsa_key_allowed entering [preauth] debug3: mm_request_send entering: type 36 [preauth] debug3: mm_request_receive entering debug3: monitor_read: checking request 36 debug3: mm_answer_rsa_keyallowed entering debug1: trying public RSA key file /home/htodd/openssh/regress/authorized_keys_htodd debug1: fd 6 clearing O_NONBLOCK debug1: /home/htodd/openssh/regress/authorized_keys_htodd, line 1: non ssh1 key syntax debug1: matching key found: file /home/htodd/openssh/regress/authorized_keys_htodd, line 2 RSA1 fe:d0:cf:47:30:46:c1:1f:55:e5:4e:60:2a:9f:1d:3b debug1: restore_uid: (unprivileged) debug3: mm_request_send entering: type 37 Failed rsa for htodd from UNKNOWN port 65535 ssh1 debug3: mm_request_receive_expect entering: type 37 [preauth] debug3: mm_request_receive entering [preauth] debug3: mm_auth_rsa_generate_challenge entering [preauth] debug3: mm_request_send entering: type 38 [preauth] debug3: mm_request_receive entering debug3: monitor_read: checking request 38 debug3: mm_answer_rsa_challenge entering debug3: mm_answer_rsa_challenge sending reply debug3: mm_request_send entering: type 39 debug2: monitor_read: 38 used once, disabling now debug3: mm_request_receive_expect entering: type 39 [preauth] debug3: mm_request_receive entering [preauth] debug3: mm_auth_rsa_verify_response entering [preauth] debug3: mm_request_send entering: type 40 [preauth] debug3: mm_request_receive entering debug3: monitor_read: checking request 40 debug3: mm_answer_rsa_response entering debug3: mm_request_send entering: type 41 debug2: monitor_read: 40 used once, disabling now Accepted rsa for htodd from UNKNOWN port 65535 ssh1 debug1: monitor_child_preauth: htodd has been authenticated by privileged process debug3: mm_get_keystate: Waiting for new keys debug3: mm_request_receive_expect entering: type 26 debug3: mm_request_receive entering debug3: mm_get_keystate: Getting compression state debug3: mm_get_keystate: Getting Network I/O buffers debug3: mm_request_receive_expect entering: type 41 [preauth] debug3: mm_request_receive entering [preauth] debug3: mm_send_keystate: Sending ssh1 KEY+IV [preauth] debug3: ssh1_3des_iv: Copying 3DES IV [preauth] debug3: ssh1_3des_iv: Copying 3DES IV [preauth] debug3: mm_send_keystate: Sending compression state [preauth] debug3: mm_request_send entering: type 26 [preauth] debug3: mm_send_keystate: Finished sending state [preauth] debug1: monitor_read_log: child log fd closed debug3: mm_share_sync: Share sync debug3: mm_share_sync: Share sync end User child is on pid 2619 debug2: cipher_init: set keylen (16 -> 32) debug2: cipher_init: set keylen (16 -> 32) debug3: ssh1_3des_iv: Installed 3DES IV debug3: ssh1_3des_iv: Installed 3DES IV debug2: session_new: allocate (allocated 0 max 10) debug3: session_unused: session id 0 unused debug1: session_new: session 0 debug1: Installing crc compensation attack detector. debug1: Exec command 'exit 0' Starting session: command for htodd from UNKNOWN port 65535 debug1: Entering interactive session. debug2: fd 8 setting O_NONBLOCK debug2: fd 9 setting O_NONBLOCK debug2: fd 11 setting O_NONBLOCK debug2: fd 7 setting O_NONBLOCK debug2: fd 10 setting O_NONBLOCK debug1: server_init_dispatch_13 debug1: server_init_dispatch_15 debug2: notify_done: reading debug1: End of interactive session; stdin 0, stdout (read 0, sent 0), stderr 0 bytes. debug1: Command exited with status 0. debug3: mm_request_receive entering debug1: do_cleanup debug1: inetd sockets after dupping: 4, 5 Connection from UNKNOWN port 65535 on UNKNOWN port 65535 debug1: Client protocol version 1.5; client software version OpenSSH_6.5 debug1: match: OpenSSH_6.5 pat OpenSSH* compat 0x04000000 debug1: Local version string SSH-1.99-OpenSSH_6.5 Generating 1024 bit RSA key. RSA key generation complete. debug2: fd 4 setting O_NONBLOCK debug2: fd 5 setting O_NONBLOCK debug2: Network child is on pid 3499 debug3: preauth child monitor started debug1: Sent 1024 bit server key and 2048 bit host key. [preauth] debug1: Encryption type: 3des [preauth] debug3: mm_request_send entering: type 32 [preauth] debug3: mm_request_receive entering debug3: monitor_read: checking request 32 debug3: mm_request_send entering: type 33 debug2: monitor_read: 32 used once, disabling now debug3: mm_request_receive_expect entering: type 33 [preauth] debug3: mm_request_receive entering [preauth] debug3: mm_ssh1_session_id entering [preauth] debug3: mm_request_send entering: type 34 [preauth] debug3: mm_request_receive entering debug3: monitor_read: checking request 34 debug3: mm_answer_sessid entering debug2: monitor_read: 34 used once, disabling now debug2: cipher_init: set keylen (16 -> 32) [preauth] debug2: cipher_init: set keylen (16 -> 32) [preauth] debug1: Received session key; encryption turned on. [preauth] debug1: Installing crc compensation attack detector. [preauth] debug3: mm_getpwnamallow entering [preauth] debug3: mm_request_send entering: type 8 [preauth] debug3: mm_request_receive entering debug3: monitor_read: checking request 8 debug3: mm_answer_pwnamallow debug2: parse_server_config: config reprocess config len 405 debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1 debug3: mm_request_send entering: type 9 debug2: monitor_read: 8 used once, disabling now debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM [preauth] debug3: mm_request_receive_expect entering: type 9 [preauth] debug3: mm_request_receive entering [preauth] debug1: Attempting authentication for htodd. [preauth] debug3: mm_auth_rsa_key_allowed entering [preauth] debug3: mm_request_send entering: type 36 [preauth] debug3: mm_request_receive entering debug3: monitor_read: checking request 36 debug3: mm_answer_rsa_keyallowed entering debug1: trying public RSA key file /home/htodd/openssh/regress/authorized_keys_htodd debug1: fd 6 clearing O_NONBLOCK debug1: /home/htodd/openssh/regress/authorized_keys_htodd, line 1: non ssh1 key syntax debug1: matching key found: file /home/htodd/openssh/regress/authorized_keys_htodd, line 2 RSA1 fe:d0:cf:47:30:46:c1:1f:55:e5:4e:60:2a:9f:1d:3b debug1: restore_uid: (unprivileged) debug3: mm_request_send entering: type 37 Failed rsa for htodd from UNKNOWN port 65535 ssh1 debug3: mm_request_receive_expect entering: type 37 [preauth] debug3: mm_request_receive entering [preauth] debug3: mm_auth_rsa_generate_challenge entering [preauth] debug3: mm_request_send entering: type 38 [preauth] debug3: mm_request_receive entering debug3: monitor_read: checking request 38 debug3: mm_answer_rsa_challenge entering debug3: mm_answer_rsa_challenge sending reply debug3: mm_request_send entering: type 39 debug2: monitor_read: 38 used once, disabling now debug3: mm_request_receive_expect entering: type 39 [preauth] debug3: mm_request_receive entering [preauth] debug3: mm_auth_rsa_verify_response entering [preauth] debug3: mm_request_send entering: type 40 [preauth] debug3: mm_request_receive entering debug3: monitor_read: checking request 40 debug3: mm_answer_rsa_response entering debug3: mm_request_send entering: type 41 debug2: monitor_read: 40 used once, disabling now Accepted rsa for htodd from UNKNOWN port 65535 ssh1 debug1: monitor_child_preauth: htodd has been authenticated by privileged process debug3: mm_get_keystate: Waiting for new keys debug3: mm_request_receive_expect entering: type 26 debug3: mm_request_receive entering debug3: mm_get_keystate: Getting compression state debug3: mm_get_keystate: Getting Network I/O buffers debug3: mm_request_receive_expect entering: type 41 [preauth] debug3: mm_request_receive entering [preauth] debug3: mm_send_keystate: Sending ssh1 KEY+IV [preauth] debug3: ssh1_3des_iv: Copying 3DES IV [preauth] debug3: ssh1_3des_iv: Copying 3DES IV [preauth] debug3: mm_send_keystate: Sending compression state [preauth] debug3: mm_request_send entering: type 26 [preauth] debug3: mm_send_keystate: Finished sending state [preauth] debug1: monitor_read_log: child log fd closed debug3: mm_share_sync: Share sync debug3: mm_share_sync: Share sync end User child is on pid 4961 debug2: cipher_init: set keylen (16 -> 32) debug2: cipher_init: set keylen (16 -> 32) debug3: ssh1_3des_iv: Installed 3DES IV debug3: ssh1_3des_iv: Installed 3DES IV debug2: session_new: allocate (allocated 0 max 10) debug3: session_unused: session id 0 unused debug1: session_new: session 0 debug1: Installing crc compensation attack detector. debug1: Exec command 'exec sh -c 'sleep 2; exec > /dev/null 2>&1; sleep 3; exit 0'' Starting session: command for htodd from UNKNOWN port 65535 debug1: Entering interactive session. debug2: fd 8 setting O_NONBLOCK debug2: fd 9 setting O_NONBLOCK debug2: fd 11 setting O_NONBLOCK debug2: fd 7 setting O_NONBLOCK debug2: fd 10 setting O_NONBLOCK debug1: server_init_dispatch_13 debug1: server_init_dispatch_15 debug1: EOF received for stdin. debug3: mm_request_receive entering debug1: do_cleanup FATAL: FAIL: trace: generate keys FATAL: sshd_proxy broken trace: generate keys FATAL: sshd_proxy broken FAIL: sshd_proxy broken trace: generate keys FATAL: sshd_proxy broken trace: generate keys FATAL: sshd_proxy broken FAIL: sshd_proxy broken trace: scp: simple copy remote file to local file FATAL: trace: scp: simple copy remote file to local file FATAL: FAIL: -------------- next part -------------- trace: generate keys FATAL: sshd_proxy broken trace: generate keys FATAL: sshd_proxy broken FAIL: sshd_proxy broken trace: scp: simple copy remote file to local file FATAL: trace: scp: simple copy remote file to local file FATAL: FAIL: trace: test remote exit status: proto 1 status 0 debug1: Executing proxy command: exec sh /home/htodd/openssh/regress/sshd-log-wrapper.sh /home/htodd/openssh/sshd /home/htodd/openssh/regress/sshd.log -i -f /home/htodd/openssh/regress/sshd_proxy debug3: Incorrect RSA1 identifier debug3: Could not load "/home/htodd/openssh/regress/rsa" as a RSA1 public key debug1: identity file /home/htodd/openssh/regress/rsa type 1 debug1: identity file /home/htodd/openssh/regress/rsa-cert type -1 debug1: identity file /home/htodd/openssh/regress/rsa1 type 0 debug1: identity file /home/htodd/openssh/regress/rsa1-cert type -1 debug1: permanently_drop_suid: 1000 debug1: Remote protocol version 1.99, remote software version OpenSSH_6.5 debug1: match: OpenSSH_6.5 pat OpenSSH* compat 0x04000000 debug1: Local version string SSH-1.5-OpenSSH_6.5 debug2: fd 6 setting O_NONBLOCK debug2: fd 5 setting O_NONBLOCK debug1: Waiting for server public key. debug1: Received server public key (1024 bits) and host key (2048 bits). debug1: Server host key: RSA1 fe:d0:cf:47:30:46:c1:1f:55:e5:4e:60:2a:9f:1d:3b debug1: using hostkeyalias: localhost-with-alias debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/htodd/openssh/regress/known_hosts" debug3: load_hostkeys: found key type RSA in file /home/htodd/openssh/regress/known_hosts:1 debug2: key_type_from_name: unknown key type '2048' debug3: key_read: missing keytype debug3: load_hostkeys: found key type RSA1 in file /home/htodd/openssh/regress/known_hosts:2 debug3: load_hostkeys: loaded 2 keys debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/htodd/openssh/regress/known_hosts" debug3: load_hostkeys: found key type RSA in file /home/htodd/openssh/regress/known_hosts:1 debug2: key_type_from_name: unknown key type '2048' debug3: key_read: missing keytype debug3: load_hostkeys: found key type RSA1 in file /home/htodd/openssh/regress/known_hosts:2 debug3: load_hostkeys: loaded 2 keys debug1: Host 'localhost-with-alias' is known and matches the RSA1 host key. debug1: Found key in /home/htodd/openssh/regress/known_hosts:2 debug1: Encryption type: 3des debug1: Sent encrypted session key. debug2: cipher_init: set keylen (16 -> 32) debug2: cipher_init: set keylen (16 -> 32) debug1: Installing crc compensation attack detector. debug1: Received encrypted confirmation. debug1: Trying RSA authentication with key '/home/htodd/openssh/regress/rsa1' debug1: Received RSA challenge from server. debug1: Sending response to host key RSA challenge. debug1: Remote: RSA authentication accepted. debug1: RSA authentication accepted by server. Authenticated to 127.0.0.1 (via proxy). debug1: Sending command: exit 0 debug1: Entering interactive session. debug2: fd 0 setting O_NONBLOCK debug1: fd 0 clearing O_NONBLOCK Transferred: sent 1202, received 804 bytes, in 0.0 seconds Bytes per second: sent 78800.1, received 52708.2 debug1: Exit status 0 debug1: Executing proxy command: exec sh /home/htodd/openssh/regress/sshd-log-wrapper.sh /home/htodd/openssh/sshd /home/htodd/openssh/regress/sshd.log -i -f /home/htodd/openssh/regress/sshd_proxy debug3: Incorrect RSA1 identifier debug3: Could not load "/home/htodd/openssh/regress/rsa" as a RSA1 public key debug1: permanently_drop_suid: 1000 debug1: identity file /home/htodd/openssh/regress/rsa type 1 debug1: identity file /home/htodd/openssh/regress/rsa-cert type -1 debug1: identity file /home/htodd/openssh/regress/rsa1 type 0 debug1: identity file /home/htodd/openssh/regress/rsa1-cert type -1 debug1: Remote protocol version 1.99, remote software version OpenSSH_6.5 debug1: match: OpenSSH_6.5 pat OpenSSH* compat 0x04000000 debug1: Local version string SSH-1.5-OpenSSH_6.5 debug2: fd 6 setting O_NONBLOCK debug2: fd 5 setting O_NONBLOCK debug1: Waiting for server public key. debug1: Received server public key (1024 bits) and host key (2048 bits). debug1: Server host key: RSA1 fe:d0:cf:47:30:46:c1:1f:55:e5:4e:60:2a:9f:1d:3b debug1: using hostkeyalias: localhost-with-alias debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/htodd/openssh/regress/known_hosts" debug3: load_hostkeys: found key type RSA in file /home/htodd/openssh/regress/known_hosts:1 debug2: key_type_from_name: unknown key type '2048' debug3: key_read: missing keytype debug3: load_hostkeys: found key type RSA1 in file /home/htodd/openssh/regress/known_hosts:2 debug3: load_hostkeys: loaded 2 keys debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/htodd/openssh/regress/known_hosts" debug3: load_hostkeys: found key type RSA in file /home/htodd/openssh/regress/known_hosts:1 debug2: key_type_from_name: unknown key type '2048' debug3: key_read: missing keytype debug3: load_hostkeys: found key type RSA1 in file /home/htodd/openssh/regress/known_hosts:2 debug3: load_hostkeys: loaded 2 keys debug1: Host 'localhost-with-alias' is known and matches the RSA1 host key. debug1: Found key in /home/htodd/openssh/regress/known_hosts:2 debug1: Encryption type: 3des debug1: Sent encrypted session key. debug2: cipher_init: set keylen (16 -> 32) debug2: cipher_init: set keylen (16 -> 32) debug1: Installing crc compensation attack detector. debug1: Received encrypted confirmation. debug1: Trying RSA authentication with key '/home/htodd/openssh/regress/rsa1' debug1: Received RSA challenge from server. debug1: Sending response to host key RSA challenge. debug1: Remote: RSA authentication accepted. debug1: RSA authentication accepted by server. Authenticated to 127.0.0.1 (via proxy). debug1: Sending command: exec sh -c 'sleep 2; exec > /dev/null 2>&1; sleep 3; exit 0' debug1: Entering interactive session. debug1: Sending eof. Killed by signal 2. FATAL: trace: test remote exit status: proto 1 status 0 debug1: Executing proxy command: exec sh /home/htodd/openssh/regress/sshd-log-wrapper.sh /home/htodd/openssh/sshd /home/htodd/openssh/regress/sshd.log -i -f /home/htodd/openssh/regress/sshd_proxy debug3: Incorrect RSA1 identifier debug3: Could not load "/home/htodd/openssh/regress/rsa" as a RSA1 public key debug1: identity file /home/htodd/openssh/regress/rsa type 1 debug1: identity file /home/htodd/openssh/regress/rsa-cert type -1 debug1: identity file /home/htodd/openssh/regress/rsa1 type 0 debug1: identity file /home/htodd/openssh/regress/rsa1-cert type -1 debug1: permanently_drop_suid: 1000 debug1: Remote protocol version 1.99, remote software version OpenSSH_6.5 debug1: match: OpenSSH_6.5 pat OpenSSH* compat 0x04000000 debug1: Local version string SSH-1.5-OpenSSH_6.5 debug2: fd 6 setting O_NONBLOCK debug2: fd 5 setting O_NONBLOCK debug1: Waiting for server public key. debug1: Received server public key (1024 bits) and host key (2048 bits). debug1: Server host key: RSA1 fe:d0:cf:47:30:46:c1:1f:55:e5:4e:60:2a:9f:1d:3b debug1: using hostkeyalias: localhost-with-alias debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/htodd/openssh/regress/known_hosts" debug3: load_hostkeys: found key type RSA in file /home/htodd/openssh/regress/known_hosts:1 debug2: key_type_from_name: unknown key type '2048' debug3: key_read: missing keytype debug3: load_hostkeys: found key type RSA1 in file /home/htodd/openssh/regress/known_hosts:2 debug3: load_hostkeys: loaded 2 keys debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/htodd/openssh/regress/known_hosts" debug3: load_hostkeys: found key type RSA in file /home/htodd/openssh/regress/known_hosts:1 debug2: key_type_from_name: unknown key type '2048' debug3: key_read: missing keytype debug3: load_hostkeys: found key type RSA1 in file /home/htodd/openssh/regress/known_hosts:2 debug3: load_hostkeys: loaded 2 keys debug1: Host 'localhost-with-alias' is known and matches the RSA1 host key. debug1: Found key in /home/htodd/openssh/regress/known_hosts:2 debug1: Encryption type: 3des debug1: Sent encrypted session key. debug2: cipher_init: set keylen (16 -> 32) debug2: cipher_init: set keylen (16 -> 32) debug1: Installing crc compensation attack detector. debug1: Received encrypted confirmation. debug1: Trying RSA authentication with key '/home/htodd/openssh/regress/rsa1' debug1: Received RSA challenge from server. debug1: Sending response to host key RSA challenge. debug1: Remote: RSA authentication accepted. debug1: RSA authentication accepted by server. Authenticated to 127.0.0.1 (via proxy). debug1: Sending command: exit 0 debug1: Entering interactive session. debug2: fd 0 setting O_NONBLOCK debug1: fd 0 clearing O_NONBLOCK Transferred: sent 1202, received 804 bytes, in 0.0 seconds Bytes per second: sent 78800.1, received 52708.2 debug1: Exit status 0 debug1: Executing proxy command: exec sh /home/htodd/openssh/regress/sshd-log-wrapper.sh /home/htodd/openssh/sshd /home/htodd/openssh/regress/sshd.log -i -f /home/htodd/openssh/regress/sshd_proxy debug3: Incorrect RSA1 identifier debug3: Could not load "/home/htodd/openssh/regress/rsa" as a RSA1 public key debug1: permanently_drop_suid: 1000 debug1: identity file /home/htodd/openssh/regress/rsa type 1 debug1: identity file /home/htodd/openssh/regress/rsa-cert type -1 debug1: identity file /home/htodd/openssh/regress/rsa1 type 0 debug1: identity file /home/htodd/openssh/regress/rsa1-cert type -1 debug1: Remote protocol version 1.99, remote software version OpenSSH_6.5 debug1: match: OpenSSH_6.5 pat OpenSSH* compat 0x04000000 debug1: Local version string SSH-1.5-OpenSSH_6.5 debug2: fd 6 setting O_NONBLOCK debug2: fd 5 setting O_NONBLOCK debug1: Waiting for server public key. debug1: Received server public key (1024 bits) and host key (2048 bits). debug1: Server host key: RSA1 fe:d0:cf:47:30:46:c1:1f:55:e5:4e:60:2a:9f:1d:3b debug1: using hostkeyalias: localhost-with-alias debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/htodd/openssh/regress/known_hosts" debug3: load_hostkeys: found key type RSA in file /home/htodd/openssh/regress/known_hosts:1 debug2: key_type_from_name: unknown key type '2048' debug3: key_read: missing keytype debug3: load_hostkeys: found key type RSA1 in file /home/htodd/openssh/regress/known_hosts:2 debug3: load_hostkeys: loaded 2 keys debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/htodd/openssh/regress/known_hosts" debug3: load_hostkeys: found key type RSA in file /home/htodd/openssh/regress/known_hosts:1 debug2: key_type_from_name: unknown key type '2048' debug3: key_read: missing keytype debug3: load_hostkeys: found key type RSA1 in file /home/htodd/openssh/regress/known_hosts:2 debug3: load_hostkeys: loaded 2 keys debug1: Host 'localhost-with-alias' is known and matches the RSA1 host key. debug1: Found key in /home/htodd/openssh/regress/known_hosts:2 debug1: Encryption type: 3des debug1: Sent encrypted session key. debug2: cipher_init: set keylen (16 -> 32) debug2: cipher_init: set keylen (16 -> 32) debug1: Installing crc compensation attack detector. debug1: Received encrypted confirmation. debug1: Trying RSA authentication with key '/home/htodd/openssh/regress/rsa1' debug1: Received RSA challenge from server. debug1: Sending response to host key RSA challenge. debug1: Remote: RSA authentication accepted. debug1: RSA authentication accepted by server. Authenticated to 127.0.0.1 (via proxy). debug1: Sending command: exec sh -c 'sleep 2; exec > /dev/null 2>&1; sleep 3; exit 0' debug1: Entering interactive session. debug1: Sending eof. Killed by signal 2. FATAL: FAIL: trace: generate keys FATAL: sshd_proxy broken trace: generate keys FATAL: sshd_proxy broken FAIL: sshd_proxy broken trace: generate keys FATAL: sshd_proxy broken trace: generate keys FATAL: sshd_proxy broken FAIL: sshd_proxy broken trace: scp: simple copy remote file to local file FATAL: trace: scp: simple copy remote file to local file FATAL: FAIL: -------------- next part -------------- trace: generate keys FATAL: sshd_proxy broken trace: generate keys FATAL: sshd_proxy broken FAIL: sshd_proxy broken trace: scp: simple copy remote file to local file FATAL: trace: scp: simple copy remote file to local file FATAL: FAIL: trace: test remote exit status: proto 1 status 0 FATAL: trace: test remote exit status: proto 1 status 0 FATAL: FAIL: trace: generate keys FATAL: sshd_proxy broken trace: generate keys FATAL: sshd_proxy broken FAIL: sshd_proxy broken trace: generate keys FATAL: sshd_proxy broken trace: generate keys FATAL: sshd_proxy broken FAIL: sshd_proxy broken trace: scp: simple copy remote file to local file FATAL: trace: scp: simple copy remote file to local file FATAL: FAIL: