Christopher Cowart <[EMAIL PROTECTED]> writes:

> When I ssh into FreeBSD hosts without allocating a tty, sshd segfaults
> after the process terminates. This problem occurs on both 6_1_REL and
> 6_2_REL installations at all sorts of patch levels.
>
> Examples:
>
> Client: `ssh -t server ls`
> Server Logs: 
> | May  9 15:33:44 server sshd[1503]: Accepted publickey for ccowart from 
> |     client port 43604 ssh2
> | May  9 15:33:45 server sshd[1505]: pam_sm_close_session(): no utmp 
> |     record for ttyp5
>
> Client: `ssh server ls`
> Server Logs:
> | May  9 15:33:50 server sshd[1509]: Accepted publickey for ccowart from
> |   client port 42119 ssh2
> | May  9 15:33:51 server pid 1511 (sshd), uid 1225: exited on signal 11
>
> In either example, the client thinks the command has completed
> successfully, shows proper output, and propogates the return value from
> the remote command. The main problem is I don't like seeing a bunch of
> segfaults being logged in the daily run output.
>
> Our sshd_config stock, except we set `PermitRootLogin yes`.
>
> Does anyone know why this happens? Should I file a problem report?

I can't reproduce it on my own machines (-STABLE, a few weeks old), so
a PR probably would need a more precise reproduction scenario.
_______________________________________________
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Reply via email to