Go to:
Gentoo Home
Documentation
Forums
Lists
Bugs
Planet
Store
Wiki
Get Gentoo!
Gentoo's Bugzilla – Attachment 761329 Details for
Bug 830623
net-misc/openssh-contrib fails with SecureCRT 9 when HPN is enabled
Home
|
New
–
[Ex]
|
Browse
|
Search
|
Privacy Policy
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
sshd debugs with HPN not in USE flag (client with same settings can succesfully connect)
openssh-nohpn-works.txt (text/plain), 5.43 KB, created by
Reuben Farrelly
on 2022-01-05 05:35:20 UTC
(
hide
)
Description:
sshd debugs with HPN not in USE flag (client with same settings can succesfully connect)
Filename:
MIME Type:
Creator:
Reuben Farrelly
Created:
2022-01-05 05:35:20 UTC
Size:
5.43 KB
patch
obsolete
>nas ~/.ssh # /usr/sbin/sshd -p 2200 -d >debug1: sshd version OpenSSH_8.8, OpenSSL 3.0.1 14 Dec 2021 >debug1: private host key #0: ssh-rsa SHA256:[REDACTED] >debug1: private host key #1: ecdsa-sha2-nistp256 SHA256:[REDACTED] >debug1: private host key #2: ssh-ed25519 SHA256:[REDACTED] >debug1: rexec_argv[0]='/usr/sbin/sshd' >debug1: rexec_argv[1]='-p' >debug1: rexec_argv[2]='2200' >debug1: rexec_argv[3]='-d' >debug1: Set /proc/self/oom_score_adj from 0 to -1000 >debug1: Bind to port 2200 on 0.0.0.0. >Server listening on 0.0.0.0 port 2200. >debug1: Bind to port 2200 on ::. >Server listening on :: port 2200. >debug1: Server will not fork when running in debugging mode. >debug1: rexec start in 5 out 5 newsock 5 pipe -1 sock 8 >debug1: sshd version OpenSSH_8.8, OpenSSL 3.0.1 14 Dec 2021 >debug1: private host key #0: ssh-rsa SHA256:[REDACTED] >debug1: private host key #1: ecdsa-sha2-nistp256 SHA256:[REDACTED] >debug1: private host key #2: ssh-ed25519 SHA256:[REDACTED] >debug1: inetd sockets after dupping: 3, 3 >Connection from 2403:5808:50:11:6949:3b5c:dce6:607d port 58923 on 2403:5808:50:10::24 port 2200 rdomain "" >debug1: Local version string SSH-2.0-OpenSSH_8.8 >debug1: Remote protocol version 2.0, remote software version SecureCRT_9.2.0 (x64 build 2659) >debug1: compat_banner: no match: SecureCRT_9.2.0 (x64 build 2659) >debug1: permanently_set_uid: 22/22 [preauth] >debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519 [preauth] >debug1: SSH2_MSG_KEXINIT sent [preauth] >debug1: SSH2_MSG_KEXINIT received [preauth] >debug1: kex: algorithm: curve25519-sha256@libssh.org [preauth] >debug1: kex: host key algorithm: rsa-sha2-512 [preauth] >debug1: kex: client->server cipher: aes256-ctr MAC: hmac-sha2-512 compression: none [preauth] >debug1: kex: server->client cipher: aes256-ctr MAC: hmac-sha2-512 compression: none [preauth] >debug1: expecting SSH2_MSG_KEX_ECDH_INIT [preauth] >debug1: SSH2_MSG_KEX_ECDH_INIT received [preauth] >debug1: rekey out after 4294967296 blocks [preauth] >debug1: SSH2_MSG_NEWKEYS sent [preauth] >debug1: Sending SSH2_MSG_EXT_INFO [preauth] >debug1: expecting SSH2_MSG_NEWKEYS [preauth] >debug1: SSH2_MSG_NEWKEYS received [preauth] >debug1: rekey in after 4294967296 blocks [preauth] >debug1: KEX done [preauth] >debug1: userauth-request for user root service ssh-connection method none [preauth] >debug1: attempt 0 failures 0 [preauth] >debug1: PAM: initializing for "root" >debug1: PAM: setting PAM_RHOST to "2403:5808:50:11:6949:3b5c:dce6:607d" >debug1: PAM: setting PAM_TTY to "ssh" >debug1: userauth-request for user root service ssh-connection method publickey [preauth] >debug1: attempt 1 failures 0 [preauth] >debug1: userauth_pubkey: test pkalg ssh-ed25519 pkblob ED25519 SHA256:[REDACTED] [preauth] >debug1: temporarily_use_uid: 0/0 (e=0/0) >debug1: trying public key file /root/.ssh/authorized_keys >debug1: fd 4 clearing O_NONBLOCK >debug1: /root/.ssh/authorized_keys:3: matching key found: ED25519 SHA256:[REDACTED] >debug1: /root/.ssh/authorized_keys:3: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding >Accepted key ED25519 SHA256:[REDACTED] found at /root/.ssh/authorized_keys:3 >debug1: restore_uid: 0/0 >Postponed publickey for root from 2403:5808:50:11:6949:3b5c:dce6:607d port 58923 ssh2 [preauth] >debug1: userauth-request for user root service ssh-connection method publickey [preauth] >debug1: attempt 2 failures 0 [preauth] >debug1: temporarily_use_uid: 0/0 (e=0/0) >debug1: trying public key file /root/.ssh/authorized_keys >debug1: fd 4 clearing O_NONBLOCK >debug1: /root/.ssh/authorized_keys:3: matching key found: ED25519 SHA256:[REDACTED] >debug1: /root/.ssh/authorized_keys:3: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding >Accepted key ED25519 SHA256:[REDACTED] found at /root/.ssh/authorized_keys:3 >debug1: restore_uid: 0/0 >debug1: auth_activate_options: setting new authentication options >debug1: do_pam_account: called >Accepted publickey for root from 2403:5808:50:11:6949:3b5c:dce6:607d port 58923 ssh2: ED25519 SHA256:[REDACTED] >debug1: monitor_child_preauth: user root authenticated by privileged process >debug1: auth_activate_options: setting new authentication options [preauth] >debug1: monitor_read_log: child log fd closed >debug1: PAM: establishing credentials >debug1: rekey in after 4294967296 blocks >debug1: rekey out after 4294967296 blocks >debug1: ssh_packet_set_postauth: called >debug1: active: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding >debug1: Entering interactive session for SSH2. >debug1: server_init_dispatch >debug1: server_input_channel_open: ctype session rchan 0 win 2097152 max 32768 >debug1: input_session_request >debug1: channel 0: new [server-session] >debug1: session_new: session 0 >debug1: session_open: channel 0 >debug1: session_open: session 0: link with channel 0 >debug1: server_input_channel_open: confirm session >debug1: Got 82/8 for keepalive >debug1: server_input_channel_req: channel 0 request pty-req reply 1 >debug1: session_by_channel: session 0 channel 0 >debug1: session_input_channel_req: session 0 req pty-req >debug1: Allocating pty. >debug1: session_pty_req: session 0 alloc /dev/pts/0 >debug1: server_input_channel_req: channel 0 request shell reply 1 >debug1: session_by_channel: session 0 channel 0 >debug1: session_input_channel_req: session 0 req shell >Starting session: shell on pts/0 for root from 2403:5808:50:11:6949:3b5c:dce6:607d port 58923 id 0 >debug1: Setting controlling tty using TIOCSCTTY.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 830623
:
761327
|
761328
| 761329 |
761330