Call for testing: OpenSSH-6.5

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

 



On Thu, 23 Jan 2014, Darren Tucker wrote:

> On Thu, Jan 23, 2014 at 12:13 PM, Hisashi T Fujinaka <htodd at twofifty.com> wrote:
>> #1  0x00007f7ff62a11f8 in strnvis (mbdst=<optimized out>,
>> dlen=140187732525536, mbsrc=<optimized out>, flags=<optimized out>)
>>     at /usr/src/lib/libc/gen/vis.c:655
>
> strnvis?  interesting.   Could you please try:
>
> ../../configure --with-cflags=-DBROKEN_STRNVIS && make clean && make tests

I gave up on the file copy and here are the three fail logs.

-- 
Hisashi T Fujinaka - htodd at twofifty.com
BSEE(6/86) + BSChem(3/95) + BAEnglish(8/95) + MSCS(8/03) + $2.50 = latte
-------------- next part --------------
trace: generate keys
FATAL: sshd_proxy broken

trace: generate keys
FATAL: sshd_proxy broken
FAIL: sshd_proxy broken

trace: scp: simple copy remote file to local file
FATAL:

trace: scp: simple copy remote file to local file
FATAL:
FAIL:

trace: test remote exit status: proto 1 status 0
debug1: inetd sockets after dupping: 4, 5

Connection from UNKNOWN port 65535 on UNKNOWN port 65535

debug1: Client protocol version 1.5; client software version OpenSSH_6.5

debug1: match: OpenSSH_6.5 pat OpenSSH* compat 0x04000000

debug1: Local version string SSH-1.99-OpenSSH_6.5

Generating 1024 bit RSA key.

RSA key generation complete.

debug2: fd 4 setting O_NONBLOCK

debug2: fd 5 setting O_NONBLOCK

debug2: Network child is on pid 4361

debug3: preauth child monitor started

debug1: Sent 1024 bit server key and 2048 bit host key. [preauth]

debug1: Encryption type: 3des [preauth]

debug3: mm_request_send entering: type 32 [preauth]

debug3: mm_request_receive entering

debug3: monitor_read: checking request 32

debug3: mm_request_send entering: type 33

debug2: monitor_read: 32 used once, disabling now

debug3: mm_request_receive_expect entering: type 33 [preauth]

debug3: mm_request_receive entering [preauth]

debug3: mm_ssh1_session_id entering [preauth]

debug3: mm_request_send entering: type 34 [preauth]

debug3: mm_request_receive entering

debug3: monitor_read: checking request 34

debug3: mm_answer_sessid entering

debug2: monitor_read: 34 used once, disabling now

debug2: cipher_init: set keylen (16 -> 32) [preauth]

debug2: cipher_init: set keylen (16 -> 32) [preauth]

debug1: Received session key; encryption turned on. [preauth]

debug1: Installing crc compensation attack detector. [preauth]

debug3: mm_getpwnamallow entering [preauth]

debug3: mm_request_send entering: type 8 [preauth]

debug3: mm_request_receive entering

debug3: monitor_read: checking request 8

debug3: mm_answer_pwnamallow

debug2: parse_server_config: config reprocess config len 405

debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1

debug3: mm_request_send entering: type 9

debug2: monitor_read: 8 used once, disabling now

debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM [preauth]

debug3: mm_request_receive_expect entering: type 9 [preauth]

debug3: mm_request_receive entering [preauth]

debug1: Attempting authentication for htodd. [preauth]

debug3: mm_auth_rsa_key_allowed entering [preauth]

debug3: mm_request_send entering: type 36 [preauth]

debug3: mm_request_receive entering

debug3: monitor_read: checking request 36

debug3: mm_answer_rsa_keyallowed entering

debug1: trying public RSA key file /home/htodd/openssh/regress/authorized_keys_htodd

debug1: fd 6 clearing O_NONBLOCK

debug1: /home/htodd/openssh/regress/authorized_keys_htodd, line 1: non ssh1 key syntax

debug1: matching key found: file /home/htodd/openssh/regress/authorized_keys_htodd, line 2 RSA1 fe:d0:cf:47:30:46:c1:1f:55:e5:4e:60:2a:9f:1d:3b

debug1: restore_uid: (unprivileged)

debug3: mm_request_send entering: type 37

Failed rsa for htodd from UNKNOWN port 65535 ssh1

debug3: mm_request_receive_expect entering: type 37 [preauth]

debug3: mm_request_receive entering [preauth]

debug3: mm_auth_rsa_generate_challenge entering [preauth]

debug3: mm_request_send entering: type 38 [preauth]

debug3: mm_request_receive entering

debug3: monitor_read: checking request 38

debug3: mm_answer_rsa_challenge entering

debug3: mm_answer_rsa_challenge sending reply

debug3: mm_request_send entering: type 39

debug2: monitor_read: 38 used once, disabling now

debug3: mm_request_receive_expect entering: type 39 [preauth]

debug3: mm_request_receive entering [preauth]

debug3: mm_auth_rsa_verify_response entering [preauth]

debug3: mm_request_send entering: type 40 [preauth]

debug3: mm_request_receive entering

debug3: monitor_read: checking request 40

debug3: mm_answer_rsa_response entering

debug3: mm_request_send entering: type 41

debug2: monitor_read: 40 used once, disabling now

Accepted rsa for htodd from UNKNOWN port 65535 ssh1

debug1: monitor_child_preauth: htodd has been authenticated by privileged process

debug3: mm_get_keystate: Waiting for new keys

debug3: mm_request_receive_expect entering: type 26

debug3: mm_request_receive entering

debug3: mm_get_keystate: Getting compression state

debug3: mm_get_keystate: Getting Network I/O buffers

debug3: mm_request_receive_expect entering: type 41 [preauth]

debug3: mm_request_receive entering [preauth]

debug3: mm_send_keystate: Sending ssh1 KEY+IV [preauth]

debug3: ssh1_3des_iv: Copying 3DES IV [preauth]

debug3: ssh1_3des_iv: Copying 3DES IV [preauth]

debug3: mm_send_keystate: Sending compression state [preauth]

debug3: mm_request_send entering: type 26 [preauth]

debug3: mm_send_keystate: Finished sending state [preauth]

debug1: monitor_read_log: child log fd closed

debug3: mm_share_sync: Share sync

debug3: mm_share_sync: Share sync end

User child is on pid 2619

debug2: cipher_init: set keylen (16 -> 32)

debug2: cipher_init: set keylen (16 -> 32)

debug3: ssh1_3des_iv: Installed 3DES IV

debug3: ssh1_3des_iv: Installed 3DES IV

debug2: session_new: allocate (allocated 0 max 10)

debug3: session_unused: session id 0 unused

debug1: session_new: session 0

debug1: Installing crc compensation attack detector.

debug1: Exec command 'exit 0'

Starting session: command for htodd from UNKNOWN port 65535

debug1: Entering interactive session.

debug2: fd 8 setting O_NONBLOCK

debug2: fd 9 setting O_NONBLOCK

debug2: fd 11 setting O_NONBLOCK

debug2: fd 7 setting O_NONBLOCK

debug2: fd 10 setting O_NONBLOCK

debug1: server_init_dispatch_13

debug1: server_init_dispatch_15

debug2: notify_done: reading

debug1: End of interactive session; stdin 0, stdout (read 0, sent 0), stderr 0 bytes.

debug1: Command exited with status 0.

debug3: mm_request_receive entering

debug1: do_cleanup

debug1: inetd sockets after dupping: 4, 5

Connection from UNKNOWN port 65535 on UNKNOWN port 65535

debug1: Client protocol version 1.5; client software version OpenSSH_6.5

debug1: match: OpenSSH_6.5 pat OpenSSH* compat 0x04000000

debug1: Local version string SSH-1.99-OpenSSH_6.5

Generating 1024 bit RSA key.

RSA key generation complete.

debug2: fd 4 setting O_NONBLOCK

debug2: fd 5 setting O_NONBLOCK

debug2: Network child is on pid 3499

debug3: preauth child monitor started

debug1: Sent 1024 bit server key and 2048 bit host key. [preauth]

debug1: Encryption type: 3des [preauth]

debug3: mm_request_send entering: type 32 [preauth]

debug3: mm_request_receive entering

debug3: monitor_read: checking request 32

debug3: mm_request_send entering: type 33

debug2: monitor_read: 32 used once, disabling now

debug3: mm_request_receive_expect entering: type 33 [preauth]

debug3: mm_request_receive entering [preauth]

debug3: mm_ssh1_session_id entering [preauth]

debug3: mm_request_send entering: type 34 [preauth]

debug3: mm_request_receive entering

debug3: monitor_read: checking request 34

debug3: mm_answer_sessid entering

debug2: monitor_read: 34 used once, disabling now

debug2: cipher_init: set keylen (16 -> 32) [preauth]

debug2: cipher_init: set keylen (16 -> 32) [preauth]

debug1: Received session key; encryption turned on. [preauth]

debug1: Installing crc compensation attack detector. [preauth]

debug3: mm_getpwnamallow entering [preauth]

debug3: mm_request_send entering: type 8 [preauth]

debug3: mm_request_receive entering

debug3: monitor_read: checking request 8

debug3: mm_answer_pwnamallow

debug2: parse_server_config: config reprocess config len 405

debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1

debug3: mm_request_send entering: type 9

debug2: monitor_read: 8 used once, disabling now

debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM [preauth]

debug3: mm_request_receive_expect entering: type 9 [preauth]

debug3: mm_request_receive entering [preauth]

debug1: Attempting authentication for htodd. [preauth]

debug3: mm_auth_rsa_key_allowed entering [preauth]

debug3: mm_request_send entering: type 36 [preauth]

debug3: mm_request_receive entering

debug3: monitor_read: checking request 36

debug3: mm_answer_rsa_keyallowed entering

debug1: trying public RSA key file /home/htodd/openssh/regress/authorized_keys_htodd

debug1: fd 6 clearing O_NONBLOCK

debug1: /home/htodd/openssh/regress/authorized_keys_htodd, line 1: non ssh1 key syntax

debug1: matching key found: file /home/htodd/openssh/regress/authorized_keys_htodd, line 2 RSA1 fe:d0:cf:47:30:46:c1:1f:55:e5:4e:60:2a:9f:1d:3b

debug1: restore_uid: (unprivileged)

debug3: mm_request_send entering: type 37

Failed rsa for htodd from UNKNOWN port 65535 ssh1

debug3: mm_request_receive_expect entering: type 37 [preauth]

debug3: mm_request_receive entering [preauth]

debug3: mm_auth_rsa_generate_challenge entering [preauth]

debug3: mm_request_send entering: type 38 [preauth]

debug3: mm_request_receive entering

debug3: monitor_read: checking request 38

debug3: mm_answer_rsa_challenge entering

debug3: mm_answer_rsa_challenge sending reply

debug3: mm_request_send entering: type 39

debug2: monitor_read: 38 used once, disabling now

debug3: mm_request_receive_expect entering: type 39 [preauth]

debug3: mm_request_receive entering [preauth]

debug3: mm_auth_rsa_verify_response entering [preauth]

debug3: mm_request_send entering: type 40 [preauth]

debug3: mm_request_receive entering

debug3: monitor_read: checking request 40

debug3: mm_answer_rsa_response entering

debug3: mm_request_send entering: type 41

debug2: monitor_read: 40 used once, disabling now

Accepted rsa for htodd from UNKNOWN port 65535 ssh1

debug1: monitor_child_preauth: htodd has been authenticated by privileged process

debug3: mm_get_keystate: Waiting for new keys

debug3: mm_request_receive_expect entering: type 26

debug3: mm_request_receive entering

debug3: mm_get_keystate: Getting compression state

debug3: mm_get_keystate: Getting Network I/O buffers

debug3: mm_request_receive_expect entering: type 41 [preauth]

debug3: mm_request_receive entering [preauth]

debug3: mm_send_keystate: Sending ssh1 KEY+IV [preauth]

debug3: ssh1_3des_iv: Copying 3DES IV [preauth]

debug3: ssh1_3des_iv: Copying 3DES IV [preauth]

debug3: mm_send_keystate: Sending compression state [preauth]

debug3: mm_request_send entering: type 26 [preauth]

debug3: mm_send_keystate: Finished sending state [preauth]

debug1: monitor_read_log: child log fd closed

debug3: mm_share_sync: Share sync

debug3: mm_share_sync: Share sync end

User child is on pid 4961

debug2: cipher_init: set keylen (16 -> 32)

debug2: cipher_init: set keylen (16 -> 32)

debug3: ssh1_3des_iv: Installed 3DES IV

debug3: ssh1_3des_iv: Installed 3DES IV

debug2: session_new: allocate (allocated 0 max 10)

debug3: session_unused: session id 0 unused

debug1: session_new: session 0

debug1: Installing crc compensation attack detector.

debug1: Exec command 'exec sh -c 'sleep 2; exec > /dev/null 2>&1; sleep 3; exit 0''

Starting session: command for htodd from UNKNOWN port 65535

debug1: Entering interactive session.

debug2: fd 8 setting O_NONBLOCK

debug2: fd 9 setting O_NONBLOCK

debug2: fd 11 setting O_NONBLOCK

debug2: fd 7 setting O_NONBLOCK

debug2: fd 10 setting O_NONBLOCK

debug1: server_init_dispatch_13

debug1: server_init_dispatch_15

debug1: EOF received for stdin.

debug3: mm_request_receive entering

debug1: do_cleanup

FATAL:

trace: test remote exit status: proto 1 status 0
debug1: inetd sockets after dupping: 4, 5

Connection from UNKNOWN port 65535 on UNKNOWN port 65535

debug1: Client protocol version 1.5; client software version OpenSSH_6.5

debug1: match: OpenSSH_6.5 pat OpenSSH* compat 0x04000000

debug1: Local version string SSH-1.99-OpenSSH_6.5

Generating 1024 bit RSA key.

RSA key generation complete.

debug2: fd 4 setting O_NONBLOCK

debug2: fd 5 setting O_NONBLOCK

debug2: Network child is on pid 4361

debug3: preauth child monitor started

debug1: Sent 1024 bit server key and 2048 bit host key. [preauth]

debug1: Encryption type: 3des [preauth]

debug3: mm_request_send entering: type 32 [preauth]

debug3: mm_request_receive entering

debug3: monitor_read: checking request 32

debug3: mm_request_send entering: type 33

debug2: monitor_read: 32 used once, disabling now

debug3: mm_request_receive_expect entering: type 33 [preauth]

debug3: mm_request_receive entering [preauth]

debug3: mm_ssh1_session_id entering [preauth]

debug3: mm_request_send entering: type 34 [preauth]

debug3: mm_request_receive entering

debug3: monitor_read: checking request 34

debug3: mm_answer_sessid entering

debug2: monitor_read: 34 used once, disabling now

debug2: cipher_init: set keylen (16 -> 32) [preauth]

debug2: cipher_init: set keylen (16 -> 32) [preauth]

debug1: Received session key; encryption turned on. [preauth]

debug1: Installing crc compensation attack detector. [preauth]

debug3: mm_getpwnamallow entering [preauth]

debug3: mm_request_send entering: type 8 [preauth]

debug3: mm_request_receive entering

debug3: monitor_read: checking request 8

debug3: mm_answer_pwnamallow

debug2: parse_server_config: config reprocess config len 405

debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1

debug3: mm_request_send entering: type 9

debug2: monitor_read: 8 used once, disabling now

debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM [preauth]

debug3: mm_request_receive_expect entering: type 9 [preauth]

debug3: mm_request_receive entering [preauth]

debug1: Attempting authentication for htodd. [preauth]

debug3: mm_auth_rsa_key_allowed entering [preauth]

debug3: mm_request_send entering: type 36 [preauth]

debug3: mm_request_receive entering

debug3: monitor_read: checking request 36

debug3: mm_answer_rsa_keyallowed entering

debug1: trying public RSA key file /home/htodd/openssh/regress/authorized_keys_htodd

debug1: fd 6 clearing O_NONBLOCK

debug1: /home/htodd/openssh/regress/authorized_keys_htodd, line 1: non ssh1 key syntax

debug1: matching key found: file /home/htodd/openssh/regress/authorized_keys_htodd, line 2 RSA1 fe:d0:cf:47:30:46:c1:1f:55:e5:4e:60:2a:9f:1d:3b

debug1: restore_uid: (unprivileged)

debug3: mm_request_send entering: type 37

Failed rsa for htodd from UNKNOWN port 65535 ssh1

debug3: mm_request_receive_expect entering: type 37 [preauth]

debug3: mm_request_receive entering [preauth]

debug3: mm_auth_rsa_generate_challenge entering [preauth]

debug3: mm_request_send entering: type 38 [preauth]

debug3: mm_request_receive entering

debug3: monitor_read: checking request 38

debug3: mm_answer_rsa_challenge entering

debug3: mm_answer_rsa_challenge sending reply

debug3: mm_request_send entering: type 39

debug2: monitor_read: 38 used once, disabling now

debug3: mm_request_receive_expect entering: type 39 [preauth]

debug3: mm_request_receive entering [preauth]

debug3: mm_auth_rsa_verify_response entering [preauth]

debug3: mm_request_send entering: type 40 [preauth]

debug3: mm_request_receive entering

debug3: monitor_read: checking request 40

debug3: mm_answer_rsa_response entering

debug3: mm_request_send entering: type 41

debug2: monitor_read: 40 used once, disabling now

Accepted rsa for htodd from UNKNOWN port 65535 ssh1

debug1: monitor_child_preauth: htodd has been authenticated by privileged process

debug3: mm_get_keystate: Waiting for new keys

debug3: mm_request_receive_expect entering: type 26

debug3: mm_request_receive entering

debug3: mm_get_keystate: Getting compression state

debug3: mm_get_keystate: Getting Network I/O buffers

debug3: mm_request_receive_expect entering: type 41 [preauth]

debug3: mm_request_receive entering [preauth]

debug3: mm_send_keystate: Sending ssh1 KEY+IV [preauth]

debug3: ssh1_3des_iv: Copying 3DES IV [preauth]

debug3: ssh1_3des_iv: Copying 3DES IV [preauth]

debug3: mm_send_keystate: Sending compression state [preauth]

debug3: mm_request_send entering: type 26 [preauth]

debug3: mm_send_keystate: Finished sending state [preauth]

debug1: monitor_read_log: child log fd closed

debug3: mm_share_sync: Share sync

debug3: mm_share_sync: Share sync end

User child is on pid 2619

debug2: cipher_init: set keylen (16 -> 32)

debug2: cipher_init: set keylen (16 -> 32)

debug3: ssh1_3des_iv: Installed 3DES IV

debug3: ssh1_3des_iv: Installed 3DES IV

debug2: session_new: allocate (allocated 0 max 10)

debug3: session_unused: session id 0 unused

debug1: session_new: session 0

debug1: Installing crc compensation attack detector.

debug1: Exec command 'exit 0'

Starting session: command for htodd from UNKNOWN port 65535

debug1: Entering interactive session.

debug2: fd 8 setting O_NONBLOCK

debug2: fd 9 setting O_NONBLOCK

debug2: fd 11 setting O_NONBLOCK

debug2: fd 7 setting O_NONBLOCK

debug2: fd 10 setting O_NONBLOCK

debug1: server_init_dispatch_13

debug1: server_init_dispatch_15

debug2: notify_done: reading

debug1: End of interactive session; stdin 0, stdout (read 0, sent 0), stderr 0 bytes.

debug1: Command exited with status 0.

debug3: mm_request_receive entering

debug1: do_cleanup

debug1: inetd sockets after dupping: 4, 5

Connection from UNKNOWN port 65535 on UNKNOWN port 65535

debug1: Client protocol version 1.5; client software version OpenSSH_6.5

debug1: match: OpenSSH_6.5 pat OpenSSH* compat 0x04000000

debug1: Local version string SSH-1.99-OpenSSH_6.5

Generating 1024 bit RSA key.

RSA key generation complete.

debug2: fd 4 setting O_NONBLOCK

debug2: fd 5 setting O_NONBLOCK

debug2: Network child is on pid 3499

debug3: preauth child monitor started

debug1: Sent 1024 bit server key and 2048 bit host key. [preauth]

debug1: Encryption type: 3des [preauth]

debug3: mm_request_send entering: type 32 [preauth]

debug3: mm_request_receive entering

debug3: monitor_read: checking request 32

debug3: mm_request_send entering: type 33

debug2: monitor_read: 32 used once, disabling now

debug3: mm_request_receive_expect entering: type 33 [preauth]

debug3: mm_request_receive entering [preauth]

debug3: mm_ssh1_session_id entering [preauth]

debug3: mm_request_send entering: type 34 [preauth]

debug3: mm_request_receive entering

debug3: monitor_read: checking request 34

debug3: mm_answer_sessid entering

debug2: monitor_read: 34 used once, disabling now

debug2: cipher_init: set keylen (16 -> 32) [preauth]

debug2: cipher_init: set keylen (16 -> 32) [preauth]

debug1: Received session key; encryption turned on. [preauth]

debug1: Installing crc compensation attack detector. [preauth]

debug3: mm_getpwnamallow entering [preauth]

debug3: mm_request_send entering: type 8 [preauth]

debug3: mm_request_receive entering

debug3: monitor_read: checking request 8

debug3: mm_answer_pwnamallow

debug2: parse_server_config: config reprocess config len 405

debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1

debug3: mm_request_send entering: type 9

debug2: monitor_read: 8 used once, disabling now

debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM [preauth]

debug3: mm_request_receive_expect entering: type 9 [preauth]

debug3: mm_request_receive entering [preauth]

debug1: Attempting authentication for htodd. [preauth]

debug3: mm_auth_rsa_key_allowed entering [preauth]

debug3: mm_request_send entering: type 36 [preauth]

debug3: mm_request_receive entering

debug3: monitor_read: checking request 36

debug3: mm_answer_rsa_keyallowed entering

debug1: trying public RSA key file /home/htodd/openssh/regress/authorized_keys_htodd

debug1: fd 6 clearing O_NONBLOCK

debug1: /home/htodd/openssh/regress/authorized_keys_htodd, line 1: non ssh1 key syntax

debug1: matching key found: file /home/htodd/openssh/regress/authorized_keys_htodd, line 2 RSA1 fe:d0:cf:47:30:46:c1:1f:55:e5:4e:60:2a:9f:1d:3b

debug1: restore_uid: (unprivileged)

debug3: mm_request_send entering: type 37

Failed rsa for htodd from UNKNOWN port 65535 ssh1

debug3: mm_request_receive_expect entering: type 37 [preauth]

debug3: mm_request_receive entering [preauth]

debug3: mm_auth_rsa_generate_challenge entering [preauth]

debug3: mm_request_send entering: type 38 [preauth]

debug3: mm_request_receive entering

debug3: monitor_read: checking request 38

debug3: mm_answer_rsa_challenge entering

debug3: mm_answer_rsa_challenge sending reply

debug3: mm_request_send entering: type 39

debug2: monitor_read: 38 used once, disabling now

debug3: mm_request_receive_expect entering: type 39 [preauth]

debug3: mm_request_receive entering [preauth]

debug3: mm_auth_rsa_verify_response entering [preauth]

debug3: mm_request_send entering: type 40 [preauth]

debug3: mm_request_receive entering

debug3: monitor_read: checking request 40

debug3: mm_answer_rsa_response entering

debug3: mm_request_send entering: type 41

debug2: monitor_read: 40 used once, disabling now

Accepted rsa for htodd from UNKNOWN port 65535 ssh1

debug1: monitor_child_preauth: htodd has been authenticated by privileged process

debug3: mm_get_keystate: Waiting for new keys

debug3: mm_request_receive_expect entering: type 26

debug3: mm_request_receive entering

debug3: mm_get_keystate: Getting compression state

debug3: mm_get_keystate: Getting Network I/O buffers

debug3: mm_request_receive_expect entering: type 41 [preauth]

debug3: mm_request_receive entering [preauth]

debug3: mm_send_keystate: Sending ssh1 KEY+IV [preauth]

debug3: ssh1_3des_iv: Copying 3DES IV [preauth]

debug3: ssh1_3des_iv: Copying 3DES IV [preauth]

debug3: mm_send_keystate: Sending compression state [preauth]

debug3: mm_request_send entering: type 26 [preauth]

debug3: mm_send_keystate: Finished sending state [preauth]

debug1: monitor_read_log: child log fd closed

debug3: mm_share_sync: Share sync

debug3: mm_share_sync: Share sync end

User child is on pid 4961

debug2: cipher_init: set keylen (16 -> 32)

debug2: cipher_init: set keylen (16 -> 32)

debug3: ssh1_3des_iv: Installed 3DES IV

debug3: ssh1_3des_iv: Installed 3DES IV

debug2: session_new: allocate (allocated 0 max 10)

debug3: session_unused: session id 0 unused

debug1: session_new: session 0

debug1: Installing crc compensation attack detector.

debug1: Exec command 'exec sh -c 'sleep 2; exec > /dev/null 2>&1; sleep 3; exit 0''

Starting session: command for htodd from UNKNOWN port 65535

debug1: Entering interactive session.

debug2: fd 8 setting O_NONBLOCK

debug2: fd 9 setting O_NONBLOCK

debug2: fd 11 setting O_NONBLOCK

debug2: fd 7 setting O_NONBLOCK

debug2: fd 10 setting O_NONBLOCK

debug1: server_init_dispatch_13

debug1: server_init_dispatch_15

debug1: EOF received for stdin.

debug3: mm_request_receive entering

debug1: do_cleanup

FATAL:
FAIL:

trace: generate keys
FATAL: sshd_proxy broken

trace: generate keys
FATAL: sshd_proxy broken
FAIL: sshd_proxy broken

trace: generate keys
FATAL: sshd_proxy broken

trace: generate keys
FATAL: sshd_proxy broken
FAIL: sshd_proxy broken

trace: scp: simple copy remote file to local file
FATAL:

trace: scp: simple copy remote file to local file
FATAL:
FAIL:

-------------- next part --------------
trace: generate keys
FATAL: sshd_proxy broken

trace: generate keys
FATAL: sshd_proxy broken
FAIL: sshd_proxy broken

trace: scp: simple copy remote file to local file
FATAL:

trace: scp: simple copy remote file to local file
FATAL:
FAIL:

trace: test remote exit status: proto 1 status 0
debug1: Executing proxy command: exec sh /home/htodd/openssh/regress/sshd-log-wrapper.sh /home/htodd/openssh/sshd /home/htodd/openssh/regress/sshd.log -i -f /home/htodd/openssh/regress/sshd_proxy

debug3: Incorrect RSA1 identifier

debug3: Could not load "/home/htodd/openssh/regress/rsa" as a RSA1 public key

debug1: identity file /home/htodd/openssh/regress/rsa type 1

debug1: identity file /home/htodd/openssh/regress/rsa-cert type -1

debug1: identity file /home/htodd/openssh/regress/rsa1 type 0

debug1: identity file /home/htodd/openssh/regress/rsa1-cert type -1

debug1: permanently_drop_suid: 1000

debug1: Remote protocol version 1.99, remote software version OpenSSH_6.5

debug1: match: OpenSSH_6.5 pat OpenSSH* compat 0x04000000

debug1: Local version string SSH-1.5-OpenSSH_6.5

debug2: fd 6 setting O_NONBLOCK

debug2: fd 5 setting O_NONBLOCK

debug1: Waiting for server public key.

debug1: Received server public key (1024 bits) and host key (2048 bits).

debug1: Server host key: RSA1 fe:d0:cf:47:30:46:c1:1f:55:e5:4e:60:2a:9f:1d:3b

debug1: using hostkeyalias: localhost-with-alias

debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/htodd/openssh/regress/known_hosts"

debug3: load_hostkeys: found key type RSA in file /home/htodd/openssh/regress/known_hosts:1

debug2: key_type_from_name: unknown key type '2048'

debug3: key_read: missing keytype

debug3: load_hostkeys: found key type RSA1 in file /home/htodd/openssh/regress/known_hosts:2

debug3: load_hostkeys: loaded 2 keys

debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/htodd/openssh/regress/known_hosts"

debug3: load_hostkeys: found key type RSA in file /home/htodd/openssh/regress/known_hosts:1

debug2: key_type_from_name: unknown key type '2048'

debug3: key_read: missing keytype

debug3: load_hostkeys: found key type RSA1 in file /home/htodd/openssh/regress/known_hosts:2

debug3: load_hostkeys: loaded 2 keys

debug1: Host 'localhost-with-alias' is known and matches the RSA1 host key.

debug1: Found key in /home/htodd/openssh/regress/known_hosts:2

debug1: Encryption type: 3des

debug1: Sent encrypted session key.

debug2: cipher_init: set keylen (16 -> 32)

debug2: cipher_init: set keylen (16 -> 32)

debug1: Installing crc compensation attack detector.

debug1: Received encrypted confirmation.

debug1: Trying RSA authentication with key '/home/htodd/openssh/regress/rsa1'

debug1: Received RSA challenge from server.

debug1: Sending response to host key RSA challenge.

debug1: Remote: RSA authentication accepted.

debug1: RSA authentication accepted by server.

Authenticated to 127.0.0.1 (via proxy).

debug1: Sending command: exit 0

debug1: Entering interactive session.

debug2: fd 0 setting O_NONBLOCK

debug1: fd 0 clearing O_NONBLOCK

Transferred: sent 1202, received 804 bytes, in 0.0 seconds

Bytes per second: sent 78800.1, received 52708.2

debug1: Exit status 0

debug1: Executing proxy command: exec sh /home/htodd/openssh/regress/sshd-log-wrapper.sh /home/htodd/openssh/sshd /home/htodd/openssh/regress/sshd.log -i -f /home/htodd/openssh/regress/sshd_proxy

debug3: Incorrect RSA1 identifier

debug3: Could not load "/home/htodd/openssh/regress/rsa" as a RSA1 public key

debug1: permanently_drop_suid: 1000

debug1: identity file /home/htodd/openssh/regress/rsa type 1

debug1: identity file /home/htodd/openssh/regress/rsa-cert type -1

debug1: identity file /home/htodd/openssh/regress/rsa1 type 0

debug1: identity file /home/htodd/openssh/regress/rsa1-cert type -1

debug1: Remote protocol version 1.99, remote software version OpenSSH_6.5

debug1: match: OpenSSH_6.5 pat OpenSSH* compat 0x04000000

debug1: Local version string SSH-1.5-OpenSSH_6.5

debug2: fd 6 setting O_NONBLOCK

debug2: fd 5 setting O_NONBLOCK

debug1: Waiting for server public key.

debug1: Received server public key (1024 bits) and host key (2048 bits).

debug1: Server host key: RSA1 fe:d0:cf:47:30:46:c1:1f:55:e5:4e:60:2a:9f:1d:3b

debug1: using hostkeyalias: localhost-with-alias

debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/htodd/openssh/regress/known_hosts"

debug3: load_hostkeys: found key type RSA in file /home/htodd/openssh/regress/known_hosts:1

debug2: key_type_from_name: unknown key type '2048'

debug3: key_read: missing keytype

debug3: load_hostkeys: found key type RSA1 in file /home/htodd/openssh/regress/known_hosts:2

debug3: load_hostkeys: loaded 2 keys

debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/htodd/openssh/regress/known_hosts"

debug3: load_hostkeys: found key type RSA in file /home/htodd/openssh/regress/known_hosts:1

debug2: key_type_from_name: unknown key type '2048'

debug3: key_read: missing keytype

debug3: load_hostkeys: found key type RSA1 in file /home/htodd/openssh/regress/known_hosts:2

debug3: load_hostkeys: loaded 2 keys

debug1: Host 'localhost-with-alias' is known and matches the RSA1 host key.

debug1: Found key in /home/htodd/openssh/regress/known_hosts:2

debug1: Encryption type: 3des

debug1: Sent encrypted session key.

debug2: cipher_init: set keylen (16 -> 32)

debug2: cipher_init: set keylen (16 -> 32)

debug1: Installing crc compensation attack detector.

debug1: Received encrypted confirmation.

debug1: Trying RSA authentication with key '/home/htodd/openssh/regress/rsa1'

debug1: Received RSA challenge from server.

debug1: Sending response to host key RSA challenge.

debug1: Remote: RSA authentication accepted.

debug1: RSA authentication accepted by server.

Authenticated to 127.0.0.1 (via proxy).

debug1: Sending command: exec sh -c 'sleep 2; exec > /dev/null 2>&1; sleep 3; exit 0'

debug1: Entering interactive session.

debug1: Sending eof.

Killed by signal 2.

FATAL:

trace: test remote exit status: proto 1 status 0
debug1: Executing proxy command: exec sh /home/htodd/openssh/regress/sshd-log-wrapper.sh /home/htodd/openssh/sshd /home/htodd/openssh/regress/sshd.log -i -f /home/htodd/openssh/regress/sshd_proxy

debug3: Incorrect RSA1 identifier

debug3: Could not load "/home/htodd/openssh/regress/rsa" as a RSA1 public key

debug1: identity file /home/htodd/openssh/regress/rsa type 1

debug1: identity file /home/htodd/openssh/regress/rsa-cert type -1

debug1: identity file /home/htodd/openssh/regress/rsa1 type 0

debug1: identity file /home/htodd/openssh/regress/rsa1-cert type -1

debug1: permanently_drop_suid: 1000

debug1: Remote protocol version 1.99, remote software version OpenSSH_6.5

debug1: match: OpenSSH_6.5 pat OpenSSH* compat 0x04000000

debug1: Local version string SSH-1.5-OpenSSH_6.5

debug2: fd 6 setting O_NONBLOCK

debug2: fd 5 setting O_NONBLOCK

debug1: Waiting for server public key.

debug1: Received server public key (1024 bits) and host key (2048 bits).

debug1: Server host key: RSA1 fe:d0:cf:47:30:46:c1:1f:55:e5:4e:60:2a:9f:1d:3b

debug1: using hostkeyalias: localhost-with-alias

debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/htodd/openssh/regress/known_hosts"

debug3: load_hostkeys: found key type RSA in file /home/htodd/openssh/regress/known_hosts:1

debug2: key_type_from_name: unknown key type '2048'

debug3: key_read: missing keytype

debug3: load_hostkeys: found key type RSA1 in file /home/htodd/openssh/regress/known_hosts:2

debug3: load_hostkeys: loaded 2 keys

debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/htodd/openssh/regress/known_hosts"

debug3: load_hostkeys: found key type RSA in file /home/htodd/openssh/regress/known_hosts:1

debug2: key_type_from_name: unknown key type '2048'

debug3: key_read: missing keytype

debug3: load_hostkeys: found key type RSA1 in file /home/htodd/openssh/regress/known_hosts:2

debug3: load_hostkeys: loaded 2 keys

debug1: Host 'localhost-with-alias' is known and matches the RSA1 host key.

debug1: Found key in /home/htodd/openssh/regress/known_hosts:2

debug1: Encryption type: 3des

debug1: Sent encrypted session key.

debug2: cipher_init: set keylen (16 -> 32)

debug2: cipher_init: set keylen (16 -> 32)

debug1: Installing crc compensation attack detector.

debug1: Received encrypted confirmation.

debug1: Trying RSA authentication with key '/home/htodd/openssh/regress/rsa1'

debug1: Received RSA challenge from server.

debug1: Sending response to host key RSA challenge.

debug1: Remote: RSA authentication accepted.

debug1: RSA authentication accepted by server.

Authenticated to 127.0.0.1 (via proxy).

debug1: Sending command: exit 0

debug1: Entering interactive session.

debug2: fd 0 setting O_NONBLOCK

debug1: fd 0 clearing O_NONBLOCK

Transferred: sent 1202, received 804 bytes, in 0.0 seconds

Bytes per second: sent 78800.1, received 52708.2

debug1: Exit status 0

debug1: Executing proxy command: exec sh /home/htodd/openssh/regress/sshd-log-wrapper.sh /home/htodd/openssh/sshd /home/htodd/openssh/regress/sshd.log -i -f /home/htodd/openssh/regress/sshd_proxy

debug3: Incorrect RSA1 identifier

debug3: Could not load "/home/htodd/openssh/regress/rsa" as a RSA1 public key

debug1: permanently_drop_suid: 1000

debug1: identity file /home/htodd/openssh/regress/rsa type 1

debug1: identity file /home/htodd/openssh/regress/rsa-cert type -1

debug1: identity file /home/htodd/openssh/regress/rsa1 type 0

debug1: identity file /home/htodd/openssh/regress/rsa1-cert type -1

debug1: Remote protocol version 1.99, remote software version OpenSSH_6.5

debug1: match: OpenSSH_6.5 pat OpenSSH* compat 0x04000000

debug1: Local version string SSH-1.5-OpenSSH_6.5

debug2: fd 6 setting O_NONBLOCK

debug2: fd 5 setting O_NONBLOCK

debug1: Waiting for server public key.

debug1: Received server public key (1024 bits) and host key (2048 bits).

debug1: Server host key: RSA1 fe:d0:cf:47:30:46:c1:1f:55:e5:4e:60:2a:9f:1d:3b

debug1: using hostkeyalias: localhost-with-alias

debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/htodd/openssh/regress/known_hosts"

debug3: load_hostkeys: found key type RSA in file /home/htodd/openssh/regress/known_hosts:1

debug2: key_type_from_name: unknown key type '2048'

debug3: key_read: missing keytype

debug3: load_hostkeys: found key type RSA1 in file /home/htodd/openssh/regress/known_hosts:2

debug3: load_hostkeys: loaded 2 keys

debug3: load_hostkeys: loading entries for host "localhost-with-alias" from file "/home/htodd/openssh/regress/known_hosts"

debug3: load_hostkeys: found key type RSA in file /home/htodd/openssh/regress/known_hosts:1

debug2: key_type_from_name: unknown key type '2048'

debug3: key_read: missing keytype

debug3: load_hostkeys: found key type RSA1 in file /home/htodd/openssh/regress/known_hosts:2

debug3: load_hostkeys: loaded 2 keys

debug1: Host 'localhost-with-alias' is known and matches the RSA1 host key.

debug1: Found key in /home/htodd/openssh/regress/known_hosts:2

debug1: Encryption type: 3des

debug1: Sent encrypted session key.

debug2: cipher_init: set keylen (16 -> 32)

debug2: cipher_init: set keylen (16 -> 32)

debug1: Installing crc compensation attack detector.

debug1: Received encrypted confirmation.

debug1: Trying RSA authentication with key '/home/htodd/openssh/regress/rsa1'

debug1: Received RSA challenge from server.

debug1: Sending response to host key RSA challenge.

debug1: Remote: RSA authentication accepted.

debug1: RSA authentication accepted by server.

Authenticated to 127.0.0.1 (via proxy).

debug1: Sending command: exec sh -c 'sleep 2; exec > /dev/null 2>&1; sleep 3; exit 0'

debug1: Entering interactive session.

debug1: Sending eof.

Killed by signal 2.

FATAL:
FAIL:

trace: generate keys
FATAL: sshd_proxy broken

trace: generate keys
FATAL: sshd_proxy broken
FAIL: sshd_proxy broken

trace: generate keys
FATAL: sshd_proxy broken

trace: generate keys
FATAL: sshd_proxy broken
FAIL: sshd_proxy broken

trace: scp: simple copy remote file to local file
FATAL:

trace: scp: simple copy remote file to local file
FATAL:
FAIL:

-------------- next part --------------
trace: generate keys
FATAL: sshd_proxy broken

trace: generate keys
FATAL: sshd_proxy broken
FAIL: sshd_proxy broken

trace: scp: simple copy remote file to local file
FATAL:

trace: scp: simple copy remote file to local file
FATAL:
FAIL:

trace: test remote exit status: proto 1 status 0
FATAL:

trace: test remote exit status: proto 1 status 0
FATAL:
FAIL:

trace: generate keys
FATAL: sshd_proxy broken

trace: generate keys
FATAL: sshd_proxy broken
FAIL: sshd_proxy broken

trace: generate keys
FATAL: sshd_proxy broken

trace: generate keys
FATAL: sshd_proxy broken
FAIL: sshd_proxy broken

trace: scp: simple copy remote file to local file
FATAL:

trace: scp: simple copy remote file to local file
FATAL:
FAIL:



[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux