this seems to only happen when trying to connect via sftp or scp. i have tried with both 2.9.9p2 and 2.9p2 as the remote client. the ssh daemon in triple debug mode gives the following. has anyone else had problems with this?
debug1: Seeding random number generator debug3: cipher ok: blowfish-cbc [blowfish-cbc,aes128-cbc,aes192-cbc,3des-cbc] debug3: cipher ok: aes128-cbc [blowfish-cbc,aes128-cbc,aes192-cbc,3des-cbc] debug3: cipher ok: aes192-cbc [blowfish-cbc,aes128-cbc,aes192-cbc,3des-cbc] debug3: cipher ok: 3des-cbc [blowfish-cbc,aes128-cbc,aes192-cbc,3des-cbc] debug3: ciphers ok: [blowfish-cbc,aes128-cbc,aes192-cbc,3des-cbc] debug2: mac_init: found hmac-sha1 debug3: mac ok: hmac-sha1 [hmac-sha1,hmac-md5,hmac-ripemd160,hmac-sha1-96,hmac-md5-96] debug2: mac_init: found hmac-md5 debug3: mac ok: hmac-md5 [hmac-sha1,hmac-md5,hmac-ripemd160,hmac-sha1-96,hmac-md5-96] debug2: mac_init: found hmac-ripemd160 debug3: mac ok: hmac-ripemd160 [hmac-sha1,hmac-md5,hmac-ripemd160,hmac-sha1-96,hmac-md5-96] debug2: mac_init: found hmac-sha1-96 debug3: mac ok: hmac-sha1-96 [hmac-sha1,hmac-md5,hmac-ripemd160,hmac-sha1-96,hmac-md5-96] debug2: mac_init: found hmac-md5-96 debug3: mac ok: hmac-md5-96 [hmac-sha1,hmac-md5,hmac-ripemd160,hmac-sha1-96,hmac-md5-96] debug3: macs ok: [hmac-sha1,hmac-md5,hmac-ripemd160,hmac-sha1-96,hmac-md5-96] debug1: sshd version OpenSSH_2.9.9p2 debug3: No RSA1 key file /etc/openssh/ssh_host_dsa_key. debug1: read PEM private key done: type DSA debug1: private host key: #0 type 2 DSA Disabling protocol version 1. Could not load host key debug1: Bind to port 22 on 0.0.0.0. Server listening on 0.0.0.0 port 22. debug1: Server will not fork when running in debugging mode. Connection from 192.168.0.15 port 33869 debug1: Client protocol version 2.0; client software version OpenSSH_2.9p2 debug1: match: OpenSSH_2.9p2 pat ^OpenSSH Enabling compatibility mode for protocol 2.0 debug1: Local version string SSH-2.0-OpenSSH_2.9.9p2 debug1: Rhosts Authentication disabled, originating port not trusted. debug1: list_hostkey_types: ssh-dss debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 debug2: kex_parse_kexinit: ssh-dss debug2: kex_parse_kexinit: blowfish-cbc,aes128-cbc,aes192-cbc,3des-cbc debug2: kex_parse_kexinit: blowfish-cbc,aes128-cbc,aes192-cbc,3des-cbc debug2: kex_parse_kexinit: hmac-sha1,hmac-md5,hmac-ripemd160,hmac-sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: hmac-sha1,hmac-md5,hmac-ripemd160,hmac-sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: none,zlib debug2: kex_parse_kexinit: none,zlib debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: first_kex_follows 0 debug2: kex_parse_kexinit: reserved 0 debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 debug2: kex_parse_kexinit: ssh-dss,ssh-rsa debug2: kex_parse_kexinit: blowfish-cbc,aes128-cbc,aes192-cbc,3des-cbc debug2: kex_parse_kexinit: blowfish-cbc,aes128-cbc,aes192-cbc,3des-cbc debug2: kex_parse_kexinit: hmac-sha1,hmac-md5,hmac-ripemd160,hmac-sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: hmac-sha1,hmac-md5,hmac-ripemd160,hmac-sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: zlib debug2: kex_parse_kexinit: zlib debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: first_kex_follows 0 debug2: kex_parse_kexinit: reserved 0 debug2: mac_init: found hmac-sha1 debug1: kex: client->server blowfish-cbc hmac-sha1 zlib debug2: mac_init: found hmac-sha1 debug1: kex: server->client blowfish-cbc hmac-sha1 zlib debug1: SSH2_MSG_KEX_DH_GEX_REQUEST received debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent debug1: dh_gen_key: priv key bits set: 156/320 debug1: bits set: 1053/2049 debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT debug1: bits set: 1011/2049 debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent debug1: kex_derive_keys debug1: newkeys: mode 1 debug1: Enabling compression at level 6. debug1: SSH2_MSG_NEWKEYS sent debug1: waiting for SSH2_MSG_NEWKEYS debug1: newkeys: mode 0 debug1: SSH2_MSG_NEWKEYS received debug1: KEX done debug1: userauth-request for user bob service ssh-connection method none debug1: attempt 0 failures 0 debug3: Trying to reverse map address 192.168.0.15. debug2: input_userauth_request: setting up authctxt for bob debug1: Starting up PAM with username "bob" debug1: PAM setting rhost to "festo" debug2: input_userauth_request: try method none debug1: userauth_banner: sent Failed none for bob from 192.168.0.15 port 33869 ssh2 debug1: userauth-request for user bob service ssh-connection method publickey debug1: attempt 1 failures 1 debug2: input_userauth_request: try method publickey debug1: test whether pkalg/pkblob are acceptable debug1: temporarily_use_uid: 2055/10 (e=0) debug1: trying public key file /export/home/bob/.ssh/authorized_keys debug1: restore_uid debug1: temporarily_use_uid: 2055/10 (e=0) debug1: trying public key file /export/home/bob/.ssh/authorized_keys2 debug3: secure_filename: checking '/export/home/bob/.ssh' debug3: secure_filename: checking '/export/home/bob' debug3: secure_filename: terminating check at '/export/home/bob' debug1: restore_uid debug2: key not found debug2: userauth_pubkey: authenticated 0 pkalg ssh-dss Failed publickey for bob from 192.168.0.15 port 33869 ssh2 debug1: userauth-request for user bob service ssh-connection method password debug1: attempt 2 failures 2 debug2: input_userauth_request: try method password debug1: PAM Password authentication accepted for user "bob" Accepted password for bob from 192.168.0.15 port 33869 ssh2 debug1: Entering interactive session for SSH2. debug1: server_init_dispatch_20 debug3: tvp!=NULL kid 0 mili 1200000 debug1: server_input_channel_open: ctype session rchan 0 win 65536 max 32768 debug1: input_session_request debug1: channel 0: new [server-session] debug1: session_new: init debug1: session_new: session 0 debug1: session_open: channel 0 debug1: session_open: session 0: link with channel 0 debug1: server_input_channel_open: confirm session debug3: tvp!=NULL kid 0 mili 1200000 debug3: tvp!=NULL kid 0 mili 1200000 debug2: callback start debug1: session_by_channel: session 0 channel 0 debug1: session_input_channel_req: session 0 channel 0 request subsystem reply 1 subsystem request for sftp debug1: subsystem: exec() /local/libexec/sftp-server Segmentation fault --------------------------------------------------------------------- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED]
