this seems to only happen when trying to connect via sftp or scp. i have
tried with both 2.9.9p2 and 2.9p2 as the remote client. the ssh daemon
in triple debug mode gives the following. has anyone else had problems
with this?


debug1: Seeding random number generator
debug3: cipher ok: blowfish-cbc
[blowfish-cbc,aes128-cbc,aes192-cbc,3des-cbc]
debug3: cipher ok: aes128-cbc
[blowfish-cbc,aes128-cbc,aes192-cbc,3des-cbc]
debug3: cipher ok: aes192-cbc
[blowfish-cbc,aes128-cbc,aes192-cbc,3des-cbc]
debug3: cipher ok: 3des-cbc
[blowfish-cbc,aes128-cbc,aes192-cbc,3des-cbc]
debug3: ciphers ok: [blowfish-cbc,aes128-cbc,aes192-cbc,3des-cbc]
debug2: mac_init: found hmac-sha1
debug3: mac ok: hmac-sha1
[hmac-sha1,hmac-md5,hmac-ripemd160,hmac-sha1-96,hmac-md5-96]
debug2: mac_init: found hmac-md5
debug3: mac ok: hmac-md5
[hmac-sha1,hmac-md5,hmac-ripemd160,hmac-sha1-96,hmac-md5-96]
debug2: mac_init: found hmac-ripemd160
debug3: mac ok: hmac-ripemd160
[hmac-sha1,hmac-md5,hmac-ripemd160,hmac-sha1-96,hmac-md5-96]
debug2: mac_init: found hmac-sha1-96
debug3: mac ok: hmac-sha1-96
[hmac-sha1,hmac-md5,hmac-ripemd160,hmac-sha1-96,hmac-md5-96]
debug2: mac_init: found hmac-md5-96
debug3: mac ok: hmac-md5-96
[hmac-sha1,hmac-md5,hmac-ripemd160,hmac-sha1-96,hmac-md5-96]
debug3: macs ok:
[hmac-sha1,hmac-md5,hmac-ripemd160,hmac-sha1-96,hmac-md5-96]
debug1: sshd version OpenSSH_2.9.9p2
debug3: No RSA1 key file /etc/openssh/ssh_host_dsa_key.
debug1: read PEM private key done: type DSA
debug1: private host key: #0 type 2 DSA
Disabling protocol version 1. Could not load host key
debug1: Bind to port 22 on 0.0.0.0.
Server listening on 0.0.0.0 port 22.
debug1: Server will not fork when running in debugging mode.
Connection from 192.168.0.15 port 33869
debug1: Client protocol version 2.0; client software version
OpenSSH_2.9p2
debug1: match: OpenSSH_2.9p2 pat ^OpenSSH
Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_2.9.9p2
debug1: Rhosts Authentication disabled, originating port not trusted.
debug1: list_hostkey_types: ssh-dss
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug2: kex_parse_kexinit:
diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-dss
debug2: kex_parse_kexinit: blowfish-cbc,aes128-cbc,aes192-cbc,3des-cbc
debug2: kex_parse_kexinit: blowfish-cbc,aes128-cbc,aes192-cbc,3des-cbc
debug2: kex_parse_kexinit:
hmac-sha1,hmac-md5,hmac-ripemd160,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit:
hmac-sha1,hmac-md5,hmac-ripemd160,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: first_kex_follows 0 
debug2: kex_parse_kexinit: reserved 0 
debug2: kex_parse_kexinit:
diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-dss,ssh-rsa
debug2: kex_parse_kexinit: blowfish-cbc,aes128-cbc,aes192-cbc,3des-cbc
debug2: kex_parse_kexinit: blowfish-cbc,aes128-cbc,aes192-cbc,3des-cbc
debug2: kex_parse_kexinit:
hmac-sha1,hmac-md5,hmac-ripemd160,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit:
hmac-sha1,hmac-md5,hmac-ripemd160,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: zlib
debug2: kex_parse_kexinit: zlib
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: first_kex_follows 0 
debug2: kex_parse_kexinit: reserved 0 
debug2: mac_init: found hmac-sha1
debug1: kex: client->server blowfish-cbc hmac-sha1 zlib
debug2: mac_init: found hmac-sha1
debug1: kex: server->client blowfish-cbc hmac-sha1 zlib
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST received
debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent
debug1: dh_gen_key: priv key bits set: 156/320
debug1: bits set: 1053/2049
debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT
debug1: bits set: 1011/2049
debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent
debug1: kex_derive_keys
debug1: newkeys: mode 1
debug1: Enabling compression at level 6.
debug1: SSH2_MSG_NEWKEYS sent
debug1: waiting for SSH2_MSG_NEWKEYS
debug1: newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: KEX done
debug1: userauth-request for user bob service ssh-connection method none
debug1: attempt 0 failures 0
debug3: Trying to reverse map address 192.168.0.15.
debug2: input_userauth_request: setting up authctxt for bob
debug1: Starting up PAM with username "bob"
debug1: PAM setting rhost to "festo"
debug2: input_userauth_request: try method none
debug1: userauth_banner: sent
Failed none for bob from 192.168.0.15 port 33869 ssh2
debug1: userauth-request for user bob service ssh-connection method
publickey
debug1: attempt 1 failures 1
debug2: input_userauth_request: try method publickey
debug1: test whether pkalg/pkblob are acceptable
debug1: temporarily_use_uid: 2055/10 (e=0)
debug1: trying public key file /export/home/bob/.ssh/authorized_keys
debug1: restore_uid
debug1: temporarily_use_uid: 2055/10 (e=0)
debug1: trying public key file /export/home/bob/.ssh/authorized_keys2
debug3: secure_filename: checking '/export/home/bob/.ssh'
debug3: secure_filename: checking '/export/home/bob'
debug3: secure_filename: terminating check at '/export/home/bob'
debug1: restore_uid
debug2: key not found
debug2: userauth_pubkey: authenticated 0 pkalg ssh-dss
Failed publickey for bob from 192.168.0.15 port 33869 ssh2
debug1: userauth-request for user bob service ssh-connection method
password
debug1: attempt 2 failures 2
debug2: input_userauth_request: try method password
debug1: PAM Password authentication accepted for user "bob"
Accepted password for bob from 192.168.0.15 port 33869 ssh2
debug1: Entering interactive session for SSH2.
debug1: server_init_dispatch_20
debug3: tvp!=NULL kid 0 mili 1200000
debug1: server_input_channel_open: ctype session rchan 0 win 65536 max
32768
debug1: input_session_request
debug1: channel 0: new [server-session]
debug1: session_new: init
debug1: session_new: session 0
debug1: session_open: channel 0
debug1: session_open: session 0: link with channel 0
debug1: server_input_channel_open: confirm session
debug3: tvp!=NULL kid 0 mili 1200000
debug3: tvp!=NULL kid 0 mili 1200000
debug2: callback start
debug1: session_by_channel: session 0 channel 0
debug1: session_input_channel_req: session 0 channel 0 request subsystem
reply 1
subsystem request for sftp
debug1: subsystem: exec() /local/libexec/sftp-server
Segmentation fault

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to