Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 06 Oct 2006 23:27:51 -0700
From:      Garrett Cooper <youshi10@u.washington.edu>
To:        freebsd-questions@freebsd.org
Subject:   Re: problems ssh'ing debug1: An invalid name was supplied (OSX	client)
Message-ID:  <452748E7.5070306@u.washington.edu>
In-Reply-To: <45273B85.1050307@enabled.com>
References:  <4526C9F7.6090705@enabled.com>	<956C94E1-87FF-4216-999E-78F0C61BA3A5@mac.com> <45273B85.1050307@enabled.com>

Next in thread | Previous in thread | Raw E-Mail | Index | Archive | Help
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Noah wrote:
> Chuck Swiger wrote:
>> On Oct 6, 2006, at 2:26 PM, Noah wrote:
>>> any clues why ssh is hanging before a prompt is provided from the
>>> server side. this prompt stalling behavior is only happening when I
>>> am coming from my OSX ssh client. Any clues on this? I have never see
>>> this betwe.
>>
>> Looks like your SSH keypair has been mangled:
>>
>> % cat ~/.ssh/id_rsa
>> -----BEGIN RSA PRIVATE KEY-----
>> [ ...should contain base-64 encoded data... ]
>> -----END RSA PRIVATE KEY-----
>>
>> If you don't have a valid keypair there in id_rsa and id_rsa.pub, use
>> ssh-keygen to make a new one.
>>
> 
> 
> Hi,
> 
> something still seems strange.  I have ~/.ssh/id_rsa and
> ~/.ssh/id_rsa.pub files.  I am able to log in just fine to other servers
> using the keygen information without stalling.  it is just two recently
> built servers out of about 10 that are displaying the stalling issue.
> 
> Here is from a server that works fine with no stall:
> 
> 
> OpenSSH_4.2p1, OpenSSL 0.9.7i 14 Oct 2005
> debug1: Reading configuration data /Users/username/.ssh/config
> debug1: Applying options for hostname
> debug1: Reading configuration data /etc/ssh_config
> debug2: ssh_connect: needpriv 0
> debug1: Connecting to host.domain.com [172.xx.yy.zz] port 22.
> debug1: Connection established.
> debug3: Not a RSA1 key file /Users/username/.ssh/id_rsa.
> debug2: key_type_from_name: unknown key type '-----BEGIN'
> debug3: key_read: missing keytype
> debug3: key_read: missing whitespace
> debug3: key_read: missing whitespace
> debug3: key_read: missing whitespace
> debug3: key_read: missing whitespace
> debug3: key_read: missing whitespace
> debug3: key_read: missing whitespace
> debug3: key_read: missing whitespace
> debug3: key_read: missing whitespace
> debug3: key_read: missing whitespace
> debug3: key_read: missing whitespace
> debug3: key_read: missing whitespace
> debug3: key_read: missing whitespace
> debug3: key_read: missing whitespace
> debug3: key_read: missing whitespace
> debug3: key_read: missing whitespace
> debug3: key_read: missing whitespace
> debug3: key_read: missing whitespace
> debug3: key_read: missing whitespace
> debug3: key_read: missing whitespace
> debug3: key_read: missing whitespace
> debug3: key_read: missing whitespace
> debug3: key_read: missing whitespace
> debug3: key_read: missing whitespace
> debug3: key_read: missing whitespace
> debug3: key_read: missing whitespace
> debug2: key_type_from_name: unknown key type '-----END'
> debug3: key_read: missing keytype
> debug1: identity file /Users/username/.ssh/id_rsa type 1
> debug1: identity file /Users/username/.ssh/id_dsa type -1
> debug1: Remote protocol version 1.99, remote software version OpenSSH_3.9p1
> debug1: match: OpenSSH_3.9p1 pat OpenSSH_3.*
> debug1: Enabling compatibility mode for protocol 2.0
> debug1: Local version string SSH-2.0-OpenSSH_4.2
> debug2: fd 3 setting O_NONBLOCK
> debug1: Miscellaneous failure
> No credentials cache found
> 
> debug1: Miscellaneous failure
> No credentials cache found
> 
> debug1: SSH2_MSG_KEXINIT sent
> debug1: SSH2_MSG_KEXINIT received
> debug2: kex_parse_kexinit:
> diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
> 
> debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
> debug2: kex_parse_kexinit:
> aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
> 
> debug2: kex_parse_kexinit:
> aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
> 
> debug2: kex_parse_kexinit:
> hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
> 
> debug2: kex_parse_kexinit:
> hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
> 
> debug2: kex_parse_kexinit: zlib@openssh.com,zlib,none
> debug2: kex_parse_kexinit: zlib@openssh.com,zlib,none
> debug2: kex_parse_kexinit:
> debug2: kex_parse_kexinit:
> debug2: kex_parse_kexinit: first_kex_follows 0
> debug2: kex_parse_kexinit: reserved 0
> debug2: kex_parse_kexinit:
> diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
> 
> debug2: kex_parse_kexinit: ssh-dss
> debug2: kex_parse_kexinit:
> aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
> 
> debug2: kex_parse_kexinit:
> aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
> 
> debug2: kex_parse_kexinit:
> hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
> 
> debug2: kex_parse_kexinit:
> hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
> 
> debug2: kex_parse_kexinit: none,zlib
> debug2: kex_parse_kexinit: none,zlib
> debug2: kex_parse_kexinit:
> debug2: kex_parse_kexinit:
> debug2: kex_parse_kexinit: first_kex_follows 0
> debug2: kex_parse_kexinit: reserved 0
> debug2: mac_init: found hmac-md5
> debug1: kex: server->client aes128-cbc hmac-md5 zlib
> debug2: mac_init: found hmac-md5
> debug1: kex: client->server aes128-cbc hmac-md5 zlib
> debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent
> debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
> debug2: dh_gen_key: priv key bits set: 131/256
> debug2: bits set: 496/1024
> debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
> debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
> debug3: check_host_in_hostfile: filename /Users/username/.ssh/known_hosts
> debug3: check_host_in_hostfile: match line 7
> debug3: check_host_in_hostfile: filename /Users/username/.ssh/known_hosts
> debug3: check_host_in_hostfile: match line 7
> debug1: Host 'host.domain.com' is known and matches the DSA host key.
> debug1: Found key in /Users/username/.ssh/known_hosts:7
> debug2: bits set: 521/1024
> debug1: ssh_dss_verify: signature correct
> debug2: kex_derive_keys
> debug2: set_newkeys: mode 1
> debug1: Enabling compression at level 6.
> debug1: SSH2_MSG_NEWKEYS sent
> debug1: expecting SSH2_MSG_NEWKEYS
> debug2: set_newkeys: mode 0
> debug1: SSH2_MSG_NEWKEYS received
> debug1: SSH2_MSG_SERVICE_REQUEST sent
> debug2: service_accept: ssh-userauth
> debug1: SSH2_MSG_SERVICE_ACCEPT received
> debug2: key: /Users/username/.ssh/id_rsa (0x301140)
> debug2: key: /Users/username/.ssh/id_dsa (0x0)
> debug1: Authentications that can continue: publickey,password
> debug3: start over, passed a different list publickey,password
> debug3: preferred
> gssapi-keyex,gssapi-with-mic,publickey,keyboard-interactive,password
> debug3: authmethod_lookup publickey
> debug3: remaining preferred: keyboard-interactive,password
> debug3: authmethod_is_enabled publickey
> debug1: Next authentication method: publickey
> debug1: Offering public key: /Users/username/.ssh/id_rsa
> debug3: send_pubkey_test
> debug2: we sent a publickey packet, wait for reply
> debug1: Server accepts key: pkalg ssh-rsa blen 277
> debug2: input_userauth_pk_ok: fp
> a6:14:91:0e:e9:91:08:3d:6e:5d:bd:40:cf:e2:af:d3
> debug3: sign_and_send_pubkey
> debug1: read PEM private key done: type RSA
> debug1: Authentication succeeded (publickey).
> debug1: channel 0: new [client-session]
> debug3: ssh_session2_open: channel_new: 0
> debug2: channel 0: send open
> debug1: Entering interactive session.
> debug2: callback start
> debug2: client_session2_setup: id 0
> debug2: channel 0: request pty-req confirm 0
> debug3: tty_make_modes: ospeed 9600
> debug3: tty_make_modes: ispeed 9600
> debug3: tty_make_modes: 1 3
> debug3: tty_make_modes: 2 28
> debug3: tty_make_modes: 3 127
> debug3: tty_make_modes: 4 21
> debug3: tty_make_modes: 5 4
> debug3: tty_make_modes: 6 255
> debug3: tty_make_modes: 7 255
> debug3: tty_make_modes: 8 17
> debug3: tty_make_modes: 9 19
> debug3: tty_make_modes: 10 26
> debug3: tty_make_modes: 11 25
> debug3: tty_make_modes: 12 18
> debug3: tty_make_modes: 13 23
> debug3: tty_make_modes: 14 22
> debug3: tty_make_modes: 17 20
> debug3: tty_make_modes: 18 15
> debug3: tty_make_modes: 30 0
> debug3: tty_make_modes: 31 0
> debug3: tty_make_modes: 32 0
> debug3: tty_make_modes: 33 0
> debug3: tty_make_modes: 34 0
> debug3: tty_make_modes: 35 0
> debug3: tty_make_modes: 36 1
> debug3: tty_make_modes: 38 1
> debug3: tty_make_modes: 39 1
> debug3: tty_make_modes: 40 0
> debug3: tty_make_modes: 41 1
> debug3: tty_make_modes: 50 1
> debug3: tty_make_modes: 51 1
> debug3: tty_make_modes: 53 1
> debug3: tty_make_modes: 54 1
> debug3: tty_make_modes: 55 0
> debug3: tty_make_modes: 56 0
> debug3: tty_make_modes: 57 0
> debug3: tty_make_modes: 58 0
> debug3: tty_make_modes: 59 1
> debug3: tty_make_modes: 60 1
> debug3: tty_make_modes: 61 1
> debug3: tty_make_modes: 62 1
> debug3: tty_make_modes: 70 1
> debug3: tty_make_modes: 72 1
> debug3: tty_make_modes: 73 0
> debug3: tty_make_modes: 74 0
> debug3: tty_make_modes: 75 0
> debug3: tty_make_modes: 90 1
> debug3: tty_make_modes: 91 1
> debug3: tty_make_modes: 92 0
> debug3: tty_make_modes: 93 0
> debug2: channel 0: request shell confirm 0
> debug2: fd 3 setting TCP_NODELAY
> debug2: callback done
> debug2: channel 0: open confirm rwindow 0 rmax 32768
> debug2: channel 0: rcvd adjust 131072
> Copyright (c) 1980, 1983, 1986, 1988, 1990, 1991, 1993, 1994
>    The Regents of the University of California.  All rights reserved.
> FreeBSD 4.10-RELEASE-p3-20041105 (hostname) #0: Wed Dec  1 09:35:10 PST
> 2004
> 
> Welcome to FreeBSD!
> 
> Before seeking technical support, please use the following resources:
> 
> o  Security advisories and updated errata information for all releases are
>   at http://www.FreeBSD.org/releases/ - always consult the ERRATA section
>   for your release first as it's updated frequently.
> 
> o  The Handbook and FAQ documents are at http://www.FreeBSD.org/ and,
>   along with the mailing lists, can be searched by going to
>   http://www.FreeBSD.org/search/.  If the doc distribution has
>   been installed, they're also available formatted in /usr/share/doc.
> 
> If you still have a question or problem, please take the output of
> `uname -a', along with any relevant error messages, and email it
> as a question to the questions@FreeBSD.org mailing list.  If you are
> unfamiliar with FreeBSD's directory layout, please refer to the hier(7)
> man page.  If you are not familiar with man pages, type `man man'.
> 
> You may also use /stand/sysinstall to re-enter the installation and
> configuration utility.  Edit /etc/motd to change this login announcement.
> 
> debug1: client_input_channel_req: channel 0 rtype exit-status reply 0
> debug2: channel 0: rcvd eof
> debug2: channel 0: output open -> drain
> debug2: channel 0: obuf empty
> debug2: channel 0: close_write
> debug2: channel 0: output drain -> closed
> debug2: channel 0: rcvd close
> debug2: channel 0: close_read
> debug2: channel 0: input open -> closed
> debug3: channel 0: will not send data after close
> debug2: channel 0: almost dead
> debug2: channel 0: gc: notify user
> debug2: channel 0: gc: user detached
> debug2: channel 0: send close
> debug2: channel 0: is dead
> debug2: channel 0: garbage collecting
> debug1: channel 0: free: client-session, nchannels 1
> debug3: channel 0: status: The following connections are open:
>  #0 client-session (t4 r0 i3/0 o3/0 fd -1/-1 cfd -1)
> 
> debug3: channel 0: close_fds r -1 w -1 e 6 c -1
> Connection to host.domain.com closed.
> debug1: Transferred: stdin 0, stdout 0, stderr 43 bytes in 1.7 seconds
> debug1: Bytes per second: stdin 0.0, stdout 0.0, stderr 25.4
> debug1: Exit status 0
> debug1: compress outgoing: raw data 1390, compressed 890, factor 0.64
> debug1: compress incoming: raw data 2070, compressed 1551, factor 0.75
> 
> 
> cheers,
> 
> Noah
> 
>> ---Chuck

Is UseDNS set to Yes in /etc/ssh/sshd_config?
- -Garrett
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFFJ0jn6CkrZkzMC68RAuadAKCBWMSzA2uL8w7+TFpzyOVxBSV0FwCfeEOR
3+PxGKEKIp7HnDaIAgcqung=
=37L6
-----END PGP SIGNATURE-----



Want to link to this message? Use this URL: <http://docs.FreeBSD.org/cgi/mid.cgi?452748E7.5070306>