Hi,
I've read the FAQ and googled, but I'm still stymied:
ssh localhost works, but scp and sftp both hang.
ssh is OpenSSH_4.2p1, OpenSSL 0.9.6c [engine] 21 dec 2001
The last lines of an "scp -4 -vvv .bashrc localhost:/tmp/" are:
----------------------------------
debug2: mac_init: found hmac-ripemd160
debug1: kex: server->client aes128-cbc hmac-ripemd160 [EMAIL PROTECTED]
debug2: mac_init: found hmac-ripemd160
debug1: kex: client->server aes128-cbc hmac-ripemd160 [EMAIL PROTECTED]
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
debug2: dh_gen_key: priv key bits set: 152/320
debug2: bits set: 1606/3191
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
debug3: check_host_in_hostfile: filename /home/ms/.ssh/known_hosts
debug3: key_read: type mismatch
debug3: check_host_in_hostfile: match line 15
debug1: Host 'localhost' is known and matches the RSA host key.
debug1: Found key in /home/ms/.ssh/known_hosts:15
debug2: bits set: 1587/3191
debug1: ssh_rsa_verify: signature correct
debug2: kex_derive_keys
debug2: set_newkeys: mode 1
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug2: set_newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: SSH2_MSG_SERVICE_REQUEST sent
debug2: service_accept: ssh-userauth
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug2: key: /home/ms/.ssh/id_dsa (0x809ad70)
debug2: key: /home/ms/.ssh/id_rsa ((nil))
debug1: Authentications that can continue: publickey,password
debug3: start over, passed a different list publickey,password
debug3: preferred publickey,keyboard-interactive,password
debug3: authmethod_lookup publickey
debug3: remaining preferred: keyboard-interactive,password
debug3: authmethod_is_enabled publickey
debug1: Next authentication method: publickey
debug1: Offering public key: /home/ms/.ssh/id_dsa
debug3: send_pubkey_test
debug2: we sent a publickey packet, wait for reply
debug1: Server accepts key: pkalg ssh-dss blen 432
debug2: input_userauth_pk_ok: fp 20:e2:42:bb:b2:48:6a:07:db:5c:99:5f:28:1c:17:88
debug3: sign_and_send_pubkey
debug1: Enabling compression at level 6.
debug1: Authentication succeeded (publickey).
debug2: fd 6 setting O_NONBLOCK
debug2: fd 9 setting O_NONBLOCK
debug1: channel 0: new [client-session]
debug3: ssh_session2_open: channel_new: 0
debug2: channel 0: send open
debug1: Entering interactive session.
debug2: callback start
debug2: client_session2_setup: id 0
debug1: Sending command: scp -v -t /tmp/
debug2: channel 0: request exec confirm 0
debug2: callback done
debug2: channel 0: open confirm rwindow 0 rmax 32768
debug2: channel 0: rcvd adjust 131072
----------------------------------
The sshd (running with DEBUG3) produces this:
----------------------------------
Oct 30 16:23:13 dream sshd[2122]: Found matching DSA key:
20:e2:42:bb:b2:48:6a:07:db:5c:99:5f:28:1c:17:88
Oct 30 16:23:13 dream sshd[2122]: debug1: restore_uid: 0/0
Oct 30 16:23:13 dream sshd[2122]: debug3: mm_answer_keyallowed: key 0x80a3d70
is allowed
Oct 30 16:23:13 dream sshd[2122]: debug3: mm_request_send entering: type 21
Oct 30 16:23:13 dream sshd[2122]: debug3: mm_request_receive entering
Oct 30 16:23:13 dream sshd[2122]: debug3: monitor_read: checking request 22
Oct 30 16:23:13 dream sshd[2122]: debug1: ssh_dss_verify: signature correct
Oct 30 16:23:13 dream sshd[2122]: debug3: mm_answer_keyverify: key 0x809ac58
signature verified
Oct 30 16:23:13 dream sshd[2122]: debug3: mm_request_send entering: type 23
Oct 30 16:23:13 dream sshd[2122]: Accepted publickey for ms from 127.0.0.1 port
32838 ssh2
Oct 30 16:23:13 dream sshd[2122]: debug1: monitor_child_preauth: ms has been
authenticated by privileged process
Oct 30 16:23:13 dream sshd[2122]: debug3: mm_get_keystate: Waiting for new keys
Oct 30 16:23:13 dream sshd[2122]: debug3: mm_request_receive_expect entering:
type 24
Oct 30 16:23:13 dream sshd[2122]: debug3: mm_request_receive entering
Oct 30 16:23:13 dream sshd[2122]: debug3: mm_newkeys_from_blob: 0x809aaa0(140)
Oct 30 16:23:13 dream sshd[2122]: debug2: mac_init: found hmac-ripemd160
Oct 30 16:23:13 dream sshd[2122]: debug3: mm_get_keystate: Waiting for second
key
Oct 30 16:23:13 dream sshd[2122]: debug3: mm_newkeys_from_blob: 0x809aaa0(140)
Oct 30 16:23:13 dream sshd[2122]: debug2: mac_init: found hmac-ripemd160
Oct 30 16:23:13 dream sshd[2122]: debug3: mm_get_keystate: Getting compression
state
Oct 30 16:23:13 dream sshd[2122]: debug3: mm_get_keystate: Getting Network I/O
buffers
Oct 30 16:23:13 dream sshd[2122]: debug3: mm_share_sync: Share sync
Oct 30 16:23:13 dream sshd[2122]: debug3: mm_share_sync: Share sync end
Oct 30 16:23:13 dream sshd[2124]: debug1: permanently_set_uid: 500/100
Oct 30 16:23:13 dream sshd[2124]: debug2: set_newkeys: mode 0
Oct 30 16:23:13 dream sshd[2124]: debug2: set_newkeys: mode 1
Oct 30 16:23:13 dream sshd[2124]: debug1: Entering interactive session for SSH2.
Oct 30 16:23:13 dream sshd[2124]: debug2: fd 5 setting O_NONBLOCK
Oct 30 16:23:13 dream sshd[2124]: debug2: fd 6 setting O_NONBLOCK
Oct 30 16:23:13 dream sshd[2124]: debug1: server_init_dispatch_20
Oct 30 16:23:13 dream sshd[2124]: debug1: server_input_channel_open: ctype
session rchan 0 win 131072 max 32768
Oct 30 16:23:13 dream sshd[2124]: debug1: input_session_request
Oct 30 16:23:13 dream sshd[2124]: debug1: channel 0: new [server-session]
Oct 30 16:23:13 dream sshd[2124]: debug1: session_new: init
Oct 30 16:23:13 dream sshd[2124]: debug1: session_new: session 0
Oct 30 16:23:13 dream sshd[2124]: debug1: session_open: channel 0
Oct 30 16:23:13 dream sshd[2124]: debug1: session_open: session 0: link with
channel 0
Oct 30 16:23:13 dream sshd[2124]: debug1: server_input_channel_open: confirm
session
Oct 30 16:23:13 dream sshd[2124]: debug1: server_input_channel_req: channel 0
request exec reply 0
Oct 30 16:23:13 dream sshd[2124]: debug1: session_by_channel: session 0 channel 0
Oct 30 16:23:13 dream sshd[2124]: debug1: session_input_channel_req: session 0
req exec
Oct 30 16:23:13 dream sshd[2125]: debug3: channel 0: close_fds r -1 w -1 e -1 c
-1
Oct 30 16:23:13 dream sshd[2124]: debug2: fd 8 setting O_NONBLOCK
Oct 30 16:23:13 dream sshd[2124]: debug3: fd 8 is O_NONBLOCK
Oct 30 16:23:13 dream sshd[2124]: debug2: fd 10 setting O_NONBLOCK
Oct 30 16:23:13 dream sshd[2122]: debug2: User child is on pid 2124
Oct 30 16:23:13 dream sshd[2122]: debug3: mm_request_receive entering
----------------------------------
After an Ctrl-C scp exits with
----------------------------------
debug1: channel 0: free: client-session, nchannels 1
debug3: channel 0: status: The following connections are open:
#0 client-session (t4 r0 i0/0 o0/0 fd 6/9 cfd -1)
debug3: channel 0: close_fds r 6 w 9 e 10 c -1
debug1: fd 0 clearing O_NONBLOCK
debug1: fd 1 clearing O_NONBLOCK
Killed by signal 2.
----------------------------------
And the sshd logs
----------------------------------
Oct 30 16:26:09 dream sshd[2124]: Connection closed by 127.0.0.1
Oct 30 16:26:09 dream sshd[2124]: debug1: channel 0: free: server-session,
nchannels 1
Oct 30 16:26:09 dream sshd[2124]: debug3: channel 0: status: The following
connections are open:\r\n #0 server-session (t4 r0 i0/0 o0/0 fd 8/8 cfd -1)\r\n
Oct 30 16:26:09 dream sshd[2124]: debug3: channel 0: close_fds r 8 w 8 e 10 c -1
Oct 30 16:26:09 dream sshd[2124]: debug1: session_close: session 0 pid 2125
Oct 30 16:26:09 dream sshd[2124]: debug1: do_cleanup
Oct 30 16:26:09 dream sshd[2124]: Closing connection to 127.0.0.1
Oct 30 16:26:09 dream sshd[2124]: debug3: mm_request_send entering: type 58
Oct 30 16:26:09 dream sshd[2122]: debug3: monitor_read: checking request 58
Oct 30 16:26:09 dream sshd[2122]: debug3: mm_answer_term: tearing down sessions
----------------------------------
The system is a Suse 8.0 (Linux 2.4.18).
Any idea how to fix this?
Thanks in advance
Martin
--
http://www.tm.oneiros.de