Hello!
I've got a problem with ssh on a debian-sarge-system and I really don't know where to look further.
The situation is as follows:
I've got a sarge system hosting some user-mode-linux environments running woody which I want to upgrade to sarge.
The upgrade went fine but afterward's I wasn't able to login via ssh anymore and I get this "Connection closed by [ip]" error message.
(also when trying to ssh to localhost from the machine itself)
ssh with public-key authentication works.
I used the same self-build uml-kernel (2.6.10) as with the woody-system.
I started debuging on client and server side (see attached files) but I can't figure out, where the error lies since I can't see any error-messages on the server or on the client at all.
I think it has something to do with pam because the debug-log stops just after the sshpam_query, or somehow with terminals but I cant figure out what.
The thing is that when I deploy this filesystem to a real harddisk an boot it I can login without problems, but not inside uml.
ssh-version used is: 3.8.1p1-8.sarge.4 kernel used: 2.6.10
I hope that somebody can help me.
Greets Patrick
Feb 10 07:59:08 atlantis sshd[442]: Connection from 10.128.0.1 port 32870 Feb 10 07:59:08 atlantis sshd[420]: debug1: Forked child 442. Feb 10 07:59:08 atlantis sshd[442]: debug1: Client protocol version 2.0; client software version OpenSSH_3.8.1p1 Debian-8.sarge.4 Feb 10 07:59:08 atlantis sshd[442]: debug1: match: OpenSSH_3.8.1p1 Debian-8.sarge.4 pat OpenSSH* Feb 10 07:59:08 atlantis sshd[442]: debug1: Enabling compatibility mode for protocol 2.0 Feb 10 07:59:08 atlantis sshd[442]: debug1: Local version string SSH-2.0-OpenSSH_3.8.1p1 Debian-8.sarge.4 Feb 10 07:59:08 atlantis sshd[442]: debug2: Network child is on pid 443 Feb 10 07:59:08 atlantis sshd[442]: debug3: preauth child monitor started Feb 10 07:59:08 atlantis sshd[442]: debug3: mm_request_receive entering Feb 10 07:59:08 atlantis sshd[442]: debug3: monitor_read: checking request 0 Feb 10 07:59:08 atlantis sshd[442]: debug3: mm_answer_moduli: got parameters: 1024 1024 8192 Feb 10 07:59:08 atlantis sshd[442]: debug3: mm_request_send entering: type 1 Feb 10 07:59:08 atlantis sshd[442]: debug2: monitor_read: 0 used once, disabling now Feb 10 07:59:08 atlantis sshd[442]: debug3: mm_request_receive entering Feb 10 07:59:08 atlantis sshd[442]: debug3: monitor_read: checking request 4 Feb 10 07:59:08 atlantis sshd[442]: debug3: mm_answer_sign Feb 10 07:59:08 atlantis sshd[442]: debug3: mm_answer_sign: signature 0x809d4e0(143) Feb 10 07:59:08 atlantis sshd[442]: debug3: mm_request_send entering: type 5 Feb 10 07:59:08 atlantis sshd[442]: debug2: monitor_read: 4 used once, disabling now Feb 10 07:59:08 atlantis sshd[442]: debug3: mm_request_receive entering Feb 10 07:59:08 atlantis sshd[442]: debug3: monitor_read: checking request 6 Feb 10 07:59:08 atlantis sshd[442]: debug3: mm_answer_pwnamallow Feb 10 07:59:08 atlantis sshd[442]: debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1 Feb 10 07:59:08 atlantis sshd[442]: debug3: mm_request_send entering: type 7 Feb 10 07:59:08 atlantis sshd[442]: debug2: monitor_read: 6 used once, disabling now Feb 10 07:59:08 atlantis sshd[442]: debug3: mm_request_receive entering Feb 10 07:59:08 atlantis sshd[442]: debug3: monitor_read: checking request 45 Feb 10 07:59:08 atlantis sshd[442]: debug1: PAM: initializing for "root" Feb 10 07:59:08 atlantis sshd[442]: debug3: Trying to reverse map address 10.128.0.1. Feb 10 07:59:08 atlantis sshd[442]: debug1: PAM: setting PAM_RHOST to "atlantis.home" Feb 10 07:59:08 atlantis sshd[442]: debug1: PAM: setting PAM_TTY to "ssh" Feb 10 07:59:08 atlantis sshd[442]: debug2: monitor_read: 45 used once, disabling now Feb 10 07:59:08 atlantis sshd[442]: debug3: mm_request_receive entering Feb 10 07:59:08 atlantis sshd[442]: debug3: monitor_read: checking request 3 Feb 10 07:59:08 atlantis sshd[442]: debug3: mm_answer_authserv: service=ssh-connection, style= Feb 10 07:59:08 atlantis sshd[442]: debug2: monitor_read: 3 used once, disabling now Feb 10 07:59:08 atlantis sshd[442]: debug3: mm_request_receive entering Feb 10 07:59:08 atlantis sshd[442]: debug3: monitor_read: checking request 20 Feb 10 07:59:09 atlantis sshd[442]: debug3: mm_answer_keyallowed entering Feb 10 07:59:09 atlantis sshd[442]: debug3: mm_answer_keyallowed: key_from_blob: 0x809f6e0 Feb 10 07:59:09 atlantis sshd[442]: debug1: temporarily_use_uid: 0/0 (e=0/0) Feb 10 07:59:09 atlantis sshd[442]: debug1: trying public key file /root/.ssh/authorized_keys Feb 10 07:59:09 atlantis sshd[442]: debug1: restore_uid: 0/0 Feb 10 07:59:09 atlantis sshd[442]: debug1: temporarily_use_uid: 0/0 (e=0/0) Feb 10 07:59:09 atlantis sshd[442]: debug1: trying public key file /root/.ssh/authorized_keys2 Feb 10 07:59:09 atlantis sshd[442]: debug1: restore_uid: 0/0 Feb 10 07:59:09 atlantis sshd[442]: debug3: mm_answer_keyallowed: key 0x809f6e0 is disallowed Feb 10 07:59:09 atlantis sshd[442]: debug3: mm_request_send entering: type 21 Feb 10 07:59:09 atlantis sshd[442]: debug3: mm_request_receive entering Feb 10 07:59:09 atlantis sshd[442]: debug3: monitor_read: checking request 48 Feb 10 07:59:09 atlantis sshd[442]: debug3: mm_answer_pam_init_ctx Feb 10 07:59:09 atlantis sshd[442]: debug3: PAM: sshpam_init_ctx entering Feb 10 07:59:09 atlantis sshd[442]: debug3: mm_request_send entering: type 49 Feb 10 07:59:09 atlantis sshd[442]: debug3: mm_request_receive entering Feb 10 07:59:09 atlantis sshd[442]: debug3: monitor_read: checking request 50 Feb 10 07:59:09 atlantis sshd[442]: debug3: mm_answer_pam_query Feb 10 07:59:09 atlantis sshd[442]: debug3: PAM: sshpam_query entering
atlantis uml # ssh -vvv 10.128.0.2 OpenSSH_3.8.1p1 Debian-8.sarge.4, OpenSSL 0.9.7e 25 Oct 2004 debug1: Reading configuration data /etc/ssh/ssh_config debug2: ssh_connect: needpriv 0 debug1: Connecting to 10.128.0.2 [10.128.0.2] port 22. debug1: Connection established. debug1: identity file /root/.ssh/identity type -1 debug1: identity file /root/.ssh/id_rsa type -1 debug3: Not a RSA1 key file /root/.ssh/id_dsa. debug2: key_type_from_name: unknown key type '-----BEGIN' debug3: key_read: missing keytype debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug2: key_type_from_name: unknown key type '-----END' debug3: key_read: missing keytype debug1: identity file /root/.ssh/id_dsa type 2 debug1: Remote protocol version 2.0, remote software version OpenSSH_3.8.1p1 Debian-8.sarge.4 debug1: match: OpenSSH_3.8.1p1 Debian-8.sarge.4 pat OpenSSH* debug1: Enabling compatibility mode for protocol 2.0 debug1: Local version string SSH-2.0-OpenSSH_3.8.1p1 Debian-8.sarge.4 debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 debug2: kex_parse_kexinit: ssh-rsa,ssh-dss debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,[EMAIL PROTECTED],aes128-ctr,aes192-ctr,aes256-ctr debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,[EMAIL PROTECTED],aes128-ctr,aes192-ctr,aes256-ctr debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,[EMAIL PROTECTED],hmac-sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,[EMAIL PROTECTED],hmac-sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: none,zlib debug2: kex_parse_kexinit: none,zlib debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: first_kex_follows 0 debug2: kex_parse_kexinit: reserved 0 debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 debug2: kex_parse_kexinit: ssh-rsa,ssh-dss debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,[EMAIL PROTECTED],aes128-ctr,aes192-ctr,aes256-ctr debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,[EMAIL PROTECTED],aes128-ctr,aes192-ctr,aes256-ctr debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,[EMAIL PROTECTED],hmac-sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,[EMAIL PROTECTED],hmac-sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: none,zlib debug2: kex_parse_kexinit: none,zlib debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: first_kex_follows 0 debug2: kex_parse_kexinit: reserved 0 debug2: mac_init: found hmac-md5 debug1: kex: server->client aes128-cbc hmac-md5 none debug2: mac_init: found hmac-md5 debug1: kex: client->server aes128-cbc hmac-md5 none debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP debug2: dh_gen_key: priv key bits set: 133/256 debug2: bits set: 501/1024 debug1: SSH2_MSG_KEX_DH_GEX_INIT sent debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY debug3: check_host_in_hostfile: filename /root/.ssh/known_hosts debug3: check_host_in_hostfile: match line 27 debug1: Host '10.128.0.2' is known and matches the RSA host key. debug1: Found key in /root/.ssh/known_hosts:27 debug2: bits set: 500/1024 debug1: ssh_rsa_verify: signature correct debug2: kex_derive_keys debug2: set_newkeys: mode 1 debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug2: set_newkeys: mode 0 debug1: SSH2_MSG_NEWKEYS received debug1: SSH2_MSG_SERVICE_REQUEST sent debug2: service_accept: ssh-userauth debug1: SSH2_MSG_SERVICE_ACCEPT received debug2: key: /root/.ssh/identity ((nil)) debug2: key: /root/.ssh/id_rsa ((nil)) debug2: key: /root/.ssh/id_dsa (0x808c4e0) debug1: Authentications that can continue: publickey,keyboard-interactive debug3: start over, passed a different list publickey,keyboard-interactive debug3: preferred publickey,keyboard-interactive,password debug3: authmethod_lookup publickey debug3: remaining preferred: keyboard-interactive,password debug3: authmethod_is_enabled publickey debug1: Next authentication method: publickey debug1: Trying private key: /root/.ssh/identity debug3: no such identity: /root/.ssh/identity debug1: Trying private key: /root/.ssh/id_rsa debug3: no such identity: /root/.ssh/id_rsa debug1: Offering public key: /root/.ssh/id_dsa debug3: send_pubkey_test debug2: we sent a publickey packet, wait for reply debug1: Authentications that can continue: publickey,keyboard-interactive debug2: we did not send a packet, disable method debug3: authmethod_lookup keyboard-interactive debug3: remaining preferred: password debug3: authmethod_is_enabled keyboard-interactive debug1: Next authentication method: keyboard-interactive debug2: userauth_kbdint debug2: we sent a keyboard-interactive packet, wait for reply Connection closed by 10.128.0.2

