* Tobias Frost: > heres the last lines of the strace, reading of the password removed. > > stat64(".", {st_mode=S_IFDIR|0755, st_size=4096, ...}) = 0 > read(7, [EMAIL PROTECTED]'s password: > (some lines removed) > stat64("./sbin", {st_mode=S_IFDIR|0755, st_size=4096, ...}) = 0 > umask(0) = 022 > umask(022) = 0 > write(6, "\0", 1) = 1 > stat64("./sbin", {st_mode=S_IFDIR|0755, st_size=4096, ...}) = 0 > read(7, Segmentation fault > "", 1) = 0 > --- SIGCHLD (Child exited) @ 0 (0) --- > read(7, "", 1) = 0 > close(7) = 0 > waitpid(10650, [{WIFEXITED(s) && WEXITSTATUS(s) == 139}], 0) = 10650 > exit_group(1) = ? > Process 10649 detached
Can you post a GDB stack trace? You should be able to obtain this by attaching gdb to the scp child process (with "gdb /usr/bin/scp PID") while ssh prompts for the password. Can you reproduce this with Debian's dropbear? -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]