Mailing-List: contact cygwin-help AT sourceware DOT cygnus DOT com; run by ezmlm List-Subscribe: List-Archive: List-Post: List-Help: , Sender: cygwin-owner AT sources DOT redhat DOT com Delivered-To: mailing list cygwin AT sources DOT redhat DOT com Message-ID: <002601c1093b$c18c4380$59b4b080@unimuenster.de> From: "Frank Wuebbeling" To: "Frank Wuebbeling" , Subject: Re: ssh stalls after completion of command Date: Tue, 10 Jul 2001 14:27:59 +0200 MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="----=_NextPart_000_0023_01C1094C.84FB22E0" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 5.50.4522.1200 X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4522.1200 ------=_NextPart_000_0023_01C1094C.84FB22E0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit > I include logs of the > server (sshd.txt) and of the client (ssh.txt). Sorry, here they are. Outlook was faster than me. ------=_NextPart_000_0023_01C1094C.84FB22E0 Content-Type: text/plain; name="sshd.txt" Content-Transfer-Encoding: quoted-printable Content-Disposition: attachment; filename="sshd.txt" debug1: Seeding random number generator debug1: sshd version OpenSSH_2.9p1 debug1: private host key: #0 type 0 RSA1 debug3: No RSA1 key file /etc/ssh_host_rsa_key. debug1: read PEM private key done: type RSA debug1: private host key: #1 type 1 RSA debug3: No RSA1 key file /etc/ssh_host_dsa_key. debug1: read PEM private key done: type DSA debug1: private host key: #2 type 2 DSA debug1: Bind to port 22 on 0.0.0.0. Server listening on 0.0.0.0 port 22. Generating 768 bit RSA key. RSA key generation complete. debug1: Server will not fork when running in debugging mode. Connection from 128.176.180.133 port 2512 debug1: Client protocol version 2.0; client software version = OpenSSH_2.9p2 debug1: match: OpenSSH_2.9p2 pat ^OpenSSH Enabling compatibility mode for protocol 2.0 debug1: Local version string SSH-1.99-OpenSSH_2.9p1 debug1: Rhosts Authentication disabled, originating port not trusted. debug1: list_hostkey_types: ssh-rsa,ssh-dss debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug2: kex_parse_kexinit: = diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 debug2: kex_parse_kexinit: ssh-rsa,ssh-dss debug2: kex_parse_kexinit: = aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cb= c,rijndael128-cbc,rijndael192-cbc,rijndael256-cbc,rijndael-cbc AT lysator DOT li= u.se debug2: kex_parse_kexinit: = aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cb= c,rijndael128-cbc,rijndael192-cbc,rijndael256-cbc,rijndael-cbc AT lysator DOT li= u.se debug2: kex_parse_kexinit: = hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 AT openssh DOT com,hmac-sha1-96= ,hmac-md5-96 debug2: kex_parse_kexinit: = hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 AT openssh DOT com,hmac-sha1-96= ,hmac-md5-96 debug2: kex_parse_kexinit: none,zlib debug2: kex_parse_kexinit: none,zlib debug2: kex_parse_kexinit:=20 debug2: kex_parse_kexinit:=20 debug2: kex_parse_kexinit: first_kex_follows 0=20 debug2: kex_parse_kexinit: reserved 0=20 debug2: kex_parse_kexinit: = diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 debug2: kex_parse_kexinit: ssh-rsa,ssh-dss debug2: kex_parse_kexinit: = aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cb= c,rijndael128-cbc,rijndael192-cbc,rijndael256-cbc,rijndael-cbc AT lysator DOT li= u.se debug2: kex_parse_kexinit: = aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cb= c,rijndael128-cbc,rijndael192-cbc,rijndael256-cbc,rijndael-cbc AT lysator DOT li= u.se debug2: kex_parse_kexinit: = hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 AT openssh DOT com,hmac-sha1-96= ,hmac-md5-96 debug2: kex_parse_kexinit: = hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 AT openssh DOT com,hmac-sha1-96= ,hmac-md5-96 debug2: kex_parse_kexinit: none debug2: kex_parse_kexinit: none debug2: kex_parse_kexinit:=20 debug2: kex_parse_kexinit:=20 debug2: kex_parse_kexinit: first_kex_follows 0=20 debug2: kex_parse_kexinit: reserved 0=20 debug2: mac_init: found hmac-md5 debug1: kex: client->server aes128-cbc hmac-md5 none debug2: mac_init: found hmac-md5 debug1: kex: server->client aes128-cbc hmac-md5 none debug1: SSH2_MSG_KEX_DH_GEX_REQUEST received debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent debug1: dh_gen_key: priv key bits set: 127/256 debug1: bits set: 1027/2049 debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT debug1: bits set: 1003/2049 debug2: ssh_rsa_sign: done debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent debug1: kex_derive_keys debug1: newkeys: mode 1 debug1: SSH2_MSG_NEWKEYS sent debug1: waiting for SSH2_MSG_NEWKEYS debug1: newkeys: mode 0 debug1: SSH2_MSG_NEWKEYS received debug1: KEX done debug1: userauth-request for user wuebbel service ssh-connection method = none debug1: attempt 0 failures 0 debug2: input_userauth_request: setting up authctxt for wuebbel debug2: input_userauth_request: try method none Failed none for wuebbel from 128.176.180.133 port 2512 ssh2 debug1: userauth-request for user wuebbel service ssh-connection method = publickey debug1: attempt 1 failures 1 debug2: input_userauth_request: try method publickey debug1: test whether pkalg/pkblob are acceptable debug1: temporarily_use_uid: 500/544 (e=3D500) debug1: matching key found: file /home/wuebbel/.ssh/authorized_keys2, = line 1 debug1: restore_uid debug2: userauth_pubkey: authenticated 0 pkalg ssh-dss Postponed publickey for wuebbel from 128.176.180.133 port 2512 ssh2 debug1: userauth-request for user wuebbel service ssh-connection method = publickey debug1: attempt 2 failures 1 debug2: input_userauth_request: try method publickey debug1: temporarily_use_uid: 500/544 (e=3D500) debug1: matching key found: file /home/wuebbel/.ssh/authorized_keys2, = line 1 debug1: restore_uid debug1: len 55 datafellows 0 debug1: ssh_dss_verify: signature correct debug2: userauth_pubkey: authenticated 1 pkalg ssh-dss Accepted publickey for wuebbel from 128.176.180.133 port 2512 ssh2 debug1: Entering interactive session for SSH2. debug1: server_init_dispatch_20 debug1: server_input_channel_open: ctype session rchan 0 win 65536 max = 32768 debug1: input_session_request debug1: channel 0: new [server-session] debug1: session_new: init debug1: session_new: session 0 debug1: session_open: channel 0 debug1: session_open: session 0: link with channel 0 debug1: server_input_channel_open: confirm session debug2: callback start debug1: session_by_channel: session 0 channel 0 debug1: session_input_channel_req: session 0 channel 0 request exec = reply 0 debug1: fd 8 setting O_NONBLOCK debug1: fd 7 setting O_NONBLOCK debug1: fd 10 setting O_NONBLOCK debug2: callback done debug2: channel 0: read 2026 from efd 10 debug2: channel 0: rwin 65536 elen 2026 euse 1 debug2: channel 0: sent ext data 2026 debug2: channel 0: read 1140 from efd 10 debug2: channel 0: rwin 63510 elen 1140 euse 1 debug2: channel 0: sent ext data 1140 debug1: Received SIGCHLD. debug1: session_by_pid: pid 554477 debug1: session_exit_message: session 0 channel 0 pid 554477 debug1: session_exit_message: release channel 0 debug1: channel 0: write failed debug1: channel 0: output open -> closed debug1: channel 0: close_write debug1: session_free: session 0 pid 554477 ------=_NextPart_000_0023_01C1094C.84FB22E0 Content-Type: text/plain; name="ssh.txt" Content-Transfer-Encoding: quoted-printable Content-Disposition: attachment; filename="ssh.txt" OpenSSH_2.9p2, SSH protocols 1.5/2.0, OpenSSL 0x0090602f=0A= debug1: Reading configuration data /usr/etc/ssh_config debug1: Seeded RNG with 39 bytes from programs debug1: Seeded RNG with 3 bytes from system calls debug1: Rhosts Authentication disabled, originating port will not be = trusted. debug1: restore_uid debug1: ssh_connect: getuid 4438 geteuid 0 anon 1 debug1: Connecting to gelfand [128.176.180.89] port 22. debug1: temporarily_use_uid: 4438/150 (e=3D0) debug1: restore_uid debug1: temporarily_use_uid: 4438/150 (e=3D0) debug1: restore_uid debug1: Connection established. debug1: read PEM private key done: type DSA debug1: read PEM private key done: type RSA debug1: identity file /u/wuebbel/.ssh/identity type 0 debug1: identity file /u/wuebbel/.ssh/id_rsa type -1 debug1: identity file /u/wuebbel/.ssh/id_dsa type 2 debug1: Remote protocol version 1.99, remote software version = OpenSSH_2.9p1 debug1: match: OpenSSH_2.9p1 pat ^OpenSSH Enabling compatibility mode for protocol 2.0 debug1: Local version string SSH-2.0-OpenSSH_2.9p2 debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: server->client aes128-cbc hmac-md5 none debug1: kex: client->server aes128-cbc hmac-md5 none debug1: SSH2_MSG_KEX_DH_GEX_REQUEST sent debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP debug1: dh_gen_key: priv key bits set: 106/256 debug1: bits set: 997/2049 debug1: SSH2_MSG_KEX_DH_GEX_INIT sent debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY debug1: Host 'gelfand' is known and matches the RSA host key. debug1: Found key in /u/wuebbel/.ssh/known_hosts2:1 debug1: bits set: 1009/2049 debug1: ssh_rsa_verify: signature correct debug1: kex_derive_keys debug1: newkeys: mode 1 debug1: SSH2_MSG_NEWKEYS sent debug1: waiting for SSH2_MSG_NEWKEYS debug1: newkeys: mode 0 debug1: SSH2_MSG_NEWKEYS received debug1: done: ssh_kex2. debug1: send SSH2_MSG_SERVICE_REQUEST debug1: service_accept: ssh-userauth debug1: got SSH2_MSG_SERVICE_ACCEPT debug1: authentications that can continue: = publickey,password,keyboard-interactive debug1: next auth method to try is publickey debug1: try privkey: /u/wuebbel/.ssh/id_rsa debug1: try pubkey: /u/wuebbel/.ssh/id_dsa debug1: input_userauth_pk_ok: pkalg ssh-dss blen 434 lastkey 0x810baa0 = hint 2 debug1: read PEM private key done: type DSA debug1: sig size 20 20 debug1: ssh-userauth2 successful: method publickey debug1: fd 7 setting O_NONBLOCK debug1: fd 8 IS O_NONBLOCK debug1: channel 0: new [client-session] debug1: channel_new: 0 debug1: send channel open 0 debug1: Entering interactive session. debug1: client_init id 0 arg 0 debug1: Sending command: id debug1: channel 0: open confirm rwindow 0 rmax 16384 debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 uid=3D500(wuebbel) gid=3D544 ------=_NextPart_000_0023_01C1094C.84FB22E0 Content-Type: text/plain; charset=us-ascii -- Unsubscribe info: http://cygwin.com/ml/#unsubscribe-simple Bug reporting: http://cygwin.com/bugs.html Documentation: http://cygwin.com/docs.html FAQ: http://cygwin.com/faq/ ------=_NextPart_000_0023_01C1094C.84FB22E0--