[Bug 208668] Re: sshd core dumps while trying to connect with a password
bnsmb
Bernd.Schemmer at gmx.de
Sat Mar 29 18:06:04 GMT 2008
>>Can't reproduce in hardy.
And now? Do I have to wait for hardy or do you need more information?
regards
Bernd
Nicolas Valcárcel (nxvl) wrote:
> Can't reproduce in hardy.
>
> nxvl at LePew:~$ sudo /usr/sbin/sshd -p 1234 -d
> debug1: sshd version OpenSSH_4.7p1 Debian-5ubuntu1
> debug1: read PEM private key done: type RSA
> debug1: private host key: #0 type 1 RSA
> debug1: read PEM private key done: type DSA
> debug1: private host key: #1 type 2 DSA
> debug1: rexec_argv[0]='/usr/sbin/sshd'
> debug1: rexec_argv[1]='-p'
> debug1: rexec_argv[2]='1234'
> debug1: rexec_argv[3]='-d'
> debug1: Bind to port 1234 on ::.
> Server listening on :: port 1234.
> debug1: Bind to port 1234 on 0.0.0.0.
> Bind to port 1234 on 0.0.0.0 failed: Address already in use.
> debug1: Server will not fork when running in debugging mode.
> debug1: rexec start in 4 out 4 newsock 4 pipe -1 sock 7
> debug1: inetd sockets after dupping: 3, 3
> Connection from 127.0.0.1 port 52375
> debug1: Client protocol version 2.0; client software version OpenSSH_4.7p1 Debian-5ubuntu1
> debug1: match: OpenSSH_4.7p1 Debian-5ubuntu1 pat OpenSSH*
> debug1: Enabling compatibility mode for protocol 2.0
> debug1: Local version string SSH-2.0-OpenSSH_4.7p1 Debian-5ubuntu1
> debug1: permanently_set_uid: 114/65534
> debug1: list_hostkey_types: ssh-rsa,ssh-dss
> debug1: SSH2_MSG_KEXINIT sent
> debug1: SSH2_MSG_KEXINIT received
> debug1: kex: client->server aes128-cbc hmac-md5 none
> debug1: kex: server->client aes128-cbc hmac-md5 none
> debug1: SSH2_MSG_KEX_DH_GEX_REQUEST received
> debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent
> debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT
> debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent
> debug1: SSH2_MSG_NEWKEYS sent
> debug1: expecting SSH2_MSG_NEWKEYS
> debug1: SSH2_MSG_NEWKEYS received
> debug1: KEX done
> debug1: userauth-request for user nxvl service ssh-connection method none
> debug1: attempt 0 failures 0
> debug1: PAM: initializing for "nxvl"
> debug1: PAM: setting PAM_RHOST to "localhost"
> debug1: PAM: setting PAM_TTY to "ssh"
> debug1: userauth-request for user nxvl service ssh-connection method publickey
> debug1: attempt 1 failures 1
> debug1: test whether pkalg/pkblob are acceptable
> Failed none for nxvl from 127.0.0.1 port 52375 ssh2
> debug1: temporarily_use_uid: 1000/1000 (e=0/0)
> debug1: trying public key file /home/nxvl/.ssh/authorized_keys
> debug1: restore_uid: 0/0
> debug1: temporarily_use_uid: 1000/1000 (e=0/0)
> debug1: trying public key file /home/nxvl/.ssh/authorized_keys2
> debug1: restore_uid: 0/0
> Failed publickey for nxvl from 127.0.0.1 port 52375 ssh2
> debug1: userauth-request for user nxvl service ssh-connection method password
> debug1: attempt 2 failures 2
> debug1: PAM: password authentication accepted for nxvl
> debug1: do_pam_account: called
> Accepted password for nxvl from 127.0.0.1 port 52375 ssh2
> debug1: monitor_child_preauth: nxvl has been authenticated by privileged process
> debug1: PAM: establishing credentials
> debug1: permanently_set_uid: 1000/1000
> debug1: SELinux support disabled
> debug1: Entering interactive session for SSH2.
> debug1: server_init_dispatch_20
> debug1: server_input_channel_open: ctype session rchan 0 win 1048576 max 16384
> debug1: input_session_request
> debug1: channel 0: new [server-session]
> debug1: session_new: init
> debug1: session_new: session 0
> debug1: session_open: channel 0
> debug1: session_open: session 0: link with channel 0
> debug1: server_input_channel_open: confirm session
> debug1: server_input_channel_req: channel 0 request pty-req reply 0
> debug1: session_by_channel: session 0 channel 0
> debug1: session_input_channel_req: session 0 req pty-req
> debug1: Allocating pty.
> debug1: session_new: init
> debug1: session_new: session 0
> debug1: SELinux support disabled
> debug1: session_pty_req: session 0 alloc /dev/pts/3
> debug1: server_input_channel_req: channel 0 request env reply 0
> debug1: session_by_channel: session 0 channel 0
> debug1: session_input_channel_req: session 0 req env
> debug1: server_input_channel_req: channel 0 request shell reply 0
> debug1: session_by_channel: session 0 channel 0
> debug1: session_input_channel_req: session 0 req shell
> debug1: PAM: setting PAM_TTY to "/dev/pts/3"
> debug1: Setting controlling tty using TIOCSCTTY.
> debug1: session_by_tty: session 0 tty /dev/pts/3
> debug1: registered uid=1000 on tty='/dev/pts/3' with ConsoleKit
> debug1: server_input_channel_req: channel 0 request window-change reply 0
> debug1: session_by_channel: session 0 channel 0
> debug1: session_input_channel_req: session 0 req window-change
> debug1: server_input_channel_req: channel 0 request window-change reply 0
> debug1: session_by_channel: session 0 channel 0
> debug1: session_input_channel_req: session 0 req window-change
> debug1: server_input_channel_req: channel 0 request window-change reply 0
> debug1: session_by_channel: session 0 channel 0
> debug1: session_input_channel_req: session 0 req window-change
> debug1: server_input_channel_req: channel 0 request window-change reply 0
> debug1: session_by_channel: session 0 channel 0
> debug1: session_input_channel_req: session 0 req window-change
> debug1: server_input_channel_req: channel 0 request window-change reply 0
> debug1: session_by_channel: session 0 channel 0
> debug1: session_input_channel_req: session 0 req window-change
> debug1: server_input_channel_req: channel 0 request window-change reply 0
> debug1: session_by_channel: session 0 channel 0
> debug1: session_input_channel_req: session 0 req window-change
> debug1: server_input_channel_req: channel 0 request window-change reply 0
> debug1: session_by_channel: session 0 channel 0
> debug1: session_input_channel_req: session 0 req window-change
> debug1: server_input_channel_req: channel 0 request window-change reply 0
> debug1: session_by_channel: session 0 channel 0
> debug1: session_input_channel_req: session 0 req window-change
> debug1: server_input_channel_req: channel 0 request window-change reply 0
> debug1: session_by_channel: session 0 channel 0
> debug1: session_input_channel_req: session 0 req window-change
> debug1: server_input_channel_req: channel 0 request window-change reply 0
> debug1: session_by_channel: session 0 channel 0
> debug1: session_input_channel_req: session 0 req window-change
> debug1: server_input_channel_req: channel 0 request window-change reply 0
> debug1: session_by_channel: session 0 channel 0
> debug1: session_input_channel_req: session 0 req window-change
> debug1: server_input_channel_req: channel 0 request window-change reply 0
> debug1: session_by_channel: session 0 channel 0
> debug1: session_input_channel_req: session 0 req window-change
> debug1: server_input_channel_req: channel 0 request window-change reply 0
> debug1: session_by_channel: session 0 channel 0
> debug1: session_input_channel_req: session 0 req window-change
> debug1: server_input_channel_req: channel 0 request window-change reply 0
> debug1: session_by_channel: session 0 channel 0
> debug1: session_input_channel_req: session 0 req window-change
> debug1: server_input_channel_req: channel 0 request window-change reply 0
> debug1: session_by_channel: session 0 channel 0
> debug1: session_input_channel_req: session 0 req window-change
> debug1: server_input_channel_req: channel 0 request window-change reply 0
> debug1: session_by_channel: session 0 channel 0
> debug1: session_input_channel_req: session 0 req window-change
>
> nxvl at LePew:~$ ssh localhost -p 1234
> The authenticity of host '[localhost]:1234 ([127.0.0.1]:1234)' can't be established.
> RSA key fingerprint is 49:72:be:bb:34:10:64:92:ae:bf:94:b6:26:80:cd:aa.
> Are you sure you want to continue connecting (yes/no)? yes
> Warning: Permanently added '[localhost]:1234' (RSA) to the list of known hosts.
> nxvl at localhost's password:
> Linux LePew 2.6.24-12-generic #1 SMP Wed Mar 12 23:01:54 UTC 2008 i686
>
> The programs included with the Ubuntu system are free software;
> the exact distribution terms for each program are described in the
> individual files in /usr/share/doc/*/copyright.
>
> Ubuntu comes with ABSOLUTELY NO WARRANTY, to the extent permitted by
> applicable law.
> Last login: Sat Mar 29 02:17:09 2008
> Environment:
> LANG=en_US.UTF-8
> USER=nxvl
> LOGNAME=nxvl
> HOME=/home/nxvl
> PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games
> MAIL=/var/mail/nxvl
> SHELL=/bin/bash
> SSH_CLIENT=127.0.0.1 52375 1234
> SSH_CONNECTION=127.0.0.1 52375 127.0.0.1 1234
> SSH_TTY=/dev/pts/3
> TERM=xterm
> XDG_SESSION_COOKIE=4e14c7a28eee80bac678230047c27cc6-1206809590.645770-778343210
> nxvl at LePew:~$
>
> grep -v "^#" /etc/ssh/sshd_config | grep -v "^$"
> Port 22
> Protocol 2
> HostKey /etc/ssh/ssh_host_rsa_key
> HostKey /etc/ssh/ssh_host_dsa_key
> UsePrivilegeSeparation yes
> KeyRegenerationInterval 3600
> ServerKeyBits 768
> SyslogFacility AUTH
> LogLevel INFO
> LoginGraceTime 120
> PermitRootLogin yes
> StrictModes yes
> RSAAuthentication yes
> PubkeyAuthentication yes
> IgnoreRhosts yes
> RhostsRSAAuthentication no
> HostbasedAuthentication no
> PermitEmptyPasswords no
> ChallengeResponseAuthentication no
> X11Forwarding yes
> X11DisplayOffset 10
> PrintMotd no
> PrintLastLog yes
> TCPKeepAlive yes
> AcceptEnv LANG LC_*
> Subsystem sftp /usr/lib/openssh/sftp-server
> UsePAM yes
>
> grep -v "^#" /etc/pam.d/ | grep -v "^$"
> atd cupsys ppp
> chfn gdm samba
> chsh gdm-autologin sshd
> common-account gnome-screensaver su
> common-auth login sudo
> common-password other xscreensaver
> common-session passwd
> cron polkit
> nxvl at LePew:~$ grep -v "^#" /etc/pam.d/sshd | grep -v "^$"
> auth required pam_env.so # [1]
> auth required pam_env.so envfile=/etc/default/locale
> @include common-auth
> account required pam_nologin.so
> @include common-account
> @include common-session
> session optional pam_motd.so # [1]
> session optional pam_mail.so standard noenv # [1]
> session required pam_limits.so
> @include common-password
>
> ** Changed in: openssh (Ubuntu)
> Status: New => Incomplete
>
>
--
Bernd Schemmer, Frankfurt am Main, Germany
http://home.arcor.de/bnsmb/index.html
M s temprano que tarde el mundo cambiar .
Fidel Castro
--
sshd core dumps while trying to connect with a password
https://bugs.launchpad.net/bugs/208668
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openssh in ubuntu.
More information about the Ubuntu-server-bugs
mailing list