Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 17 Oct 2002 15:50:23 -0700 (PDT)
From:      twig les <twigles@yahoo.com>
To:        freebsd-security@FreeBSD.ORG
Subject:   SSH keeps dying while box seems to be up/PC Weasel?
Message-ID:  <20021017225023.18216.qmail@web10102.mail.yahoo.com>

next in thread | raw e-mail | index | archive | help
Hey all, strange problem here that is probably just
bad ram but maybe someone here might see something I
missed.  I have 2 identical boxes running 4.6 release
(patched & stripped down) in another state, so I can't
sit on the console and watch stuff.  One box is fine,
the other is hell in beige.  The box keeps becoming
unresponsive; the first crash was Saturday morning
(note to self - turn off cell phone on Friday) and
then again on Sunday and today twice.  Each time I
have to call remote hands and get them to hard reboot
the thing.

This box was running happily for about 2-3 months with
this config - nothing changed last week.  Previously
this box ran 4.4 release for almost a year without a
single crash.

So anyway the debug output from my ssh attempt is
below.  On a related issue, can anyone recommend the
PC Weasel for console access from experience?  I can't
exactly point my management to their site since it's
completely unprofessional (I actually like it, I just
can't send management there) so any experience is
welcome.

===========================================
ssh debug
===========================================
Client% ssh -v -v -v Server
debug:
SshAppCommon/sshappcommon.c:133/ssh_app_get_global_regex_context:
Allocating global SshRegex context.
debug: SshConfig/sshconfig.c:2232/ssh2_parse_config:
Unable to open /opt/home/ktokash/.ssh2/ssh2_config
debug: Connecting to mas01, port 22... (SOCKS not
used)
debug: Ssh2/ssh2.c:1977/main: Entering event loop.
debug: Ssh2Client/sshclient.c:1403/ssh_client_wrap:
Creating transport protocol.
debug:
SshAuthMethodClient/sshauthmethodc.c:85/ssh_client_authentication_initialize:
Added "hostbased" to usable methods.
debug:
SshAuthMethodClient/sshauthmethodc.c:85/ssh_client_authentication_initialize:
Added "securid-1@ssh.com" to usable methods.
debug:
SshAuthMethodClient/sshauthmethodc.c:85/ssh_client_authentication_initialize:
Added "publickey" to usable methods.
debug:
SshAuthMethodClient/sshauthmethodc.c:85/ssh_client_authentication_initialize:
Added "password" to usable methods.
debug: Ssh2Client/sshclient.c:1444/ssh_client_wrap:
Creating userauth protocol.
debug: client supports 4 auth methods:
'hostbased,securid-1@ssh.com,publickey,password'
debug: Ssh2Common/sshcommon.c:560/ssh_common_wrap:
local ip = 10.30.150.162, local port = 53843
debug: Ssh2Common/sshcommon.c:562/ssh_common_wrap:
remote ip = 10.20.0.124, remote port = 22
debug: SshConnection/sshconn.c:1930/ssh_conn_wrap:
Wrapping...
debug: Remote version: SSH-1.99-OpenSSH_2.9 FreeBSD
localisations 20020307
debug:
Ssh2Transport/trcommon.c:1306/ssh_tr_input_version:
Remote version has rekey incompatibility bug.
debug:
Ssh2Transport/trcommon.c:1309/ssh_tr_input_version:
Remote version is OpenSSH, KEX guesses disabled.
debug: Ssh2Transport/trcommon.c:1648/ssh_tr_negotiate:
lang s to c: `', lang c to s: `'
debug: Ssh2Transport/trcommon.c:1714/ssh_tr_negotiate:
c_to_s: cipher aes128-cbc, mac hmac-sha1, compression
none
debug: Ssh2Transport/trcommon.c:1717/ssh_tr_negotiate:
s_to_c: cipher aes128-cbc, mac hmac-sha1, compression
none
debug: Remote host key found from database.
debug: Ssh2Common/sshcommon.c:318/ssh_common_special:
Received SSH_CROSS_STARTUP packet from connection
protocol.
debug: Ssh2Common/sshcommon.c:368/ssh_common_special:
Received SSH_CROSS_ALGORITHMS packet from connection
protocol.
debug: server offers auth methods
'publickey,password,keyboard-interactive'.
debug: SshConfig/sshconfig.c:2232/ssh2_parse_config:
Unable to open /opt/home/ktokash/.ssh2/identification
debug:
Ssh2AuthClient/sshauthc.c:316/ssh_authc_completion_proc:
Method 'publickey' disabled.
debug: server offers auth methods
'publickey,password,keyboard-interactive'.
debug:
Ssh2AuthPasswdClient/authc-passwd.c:95/ssh_client_auth_passwd:
Starting password query...
ktokash's password: 
debug: Ssh2Common/sshcommon.c:286/ssh_common_special:
Received SSH_CROSS_AUTHENTICATED packet from
connection protocol.
debug:
Ssh2Common/sshcommon.c:829/ssh_common_new_channel:
num_channels now 1
debug:
Ssh2Common/sshcommon.c:155/ssh_common_disconnect:
DISCONNECT received: Connection closed.
debug: Ssh2/ssh2.c:127/client_disconnect:
locally_generated = TRUE
Disconnected; connection lost (Connection closed.).
debug: Ssh2Client/sshclient.c:1478/ssh_client_destroy:
Destroying client.
debug: SshConfig/sshconfig.c:537/ssh_config_pki_free:
Freeing pki. (host_pki != NULL, user_pki = NULL)
debug: SshConnection/sshconn.c:1982/ssh_conn_destroy:
Destroying SshConn object.
debug:
Ssh2Common/sshcommon.c:803/ssh_common_destroy_channel:
num_channels now 0
debug: Got session close with exit_status=0
debug: destroying client struct...
Connection to mas01 closed.
debug:
Ssh2Client/sshclient.c:1540/ssh_client_destroy_finalize:
Destroying client completed.
debug:
SshAuthMethodClient/sshauthmethodc.c:89/ssh_client_authentication_uninitialize:
Destroying authentication method array.
debug:
SshAppCommon/sshappcommon.c:146/ssh_app_free_global_regex_context:
Freeing global SshRegex context.
debug: SshConfig/sshconfig.c:537/ssh_config_pki_free:
Freeing pki. (host_pki = NULL, user_pki = NULL)


=====
-----------------------------------------------------------
Heavy metal made me do it.                        
-----------------------------------------------------------

__________________________________________________
Do you Yahoo!?
Faith Hill - Exclusive Performances, Videos & More
http://faith.yahoo.com

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20021017225023.18216.qmail>