Mike Tancsa
2013-Mar-01 16:35 UTC
svn commit: r247485 - in stable/9: crypto/openssh crypto/openssh/openbsd-compat secure/lib/libssh secure/usr.sbin/sshd
On 2/28/2013 1:43 PM, Dag-Erling Sm?rgrav wrote:> Author: des > Date: Thu Feb 28 18:43:50 2013 > New Revision: 247485 > URL: http://svnweb.freebsd.org/changeset/base/247485 > > Log: > Pull in OpenSSH 6.1 from head.Hi, I updated a box to RELENG_9 with this change, and I can no longer ssh from my secure crt client. I have a stock sshd_config, but when I connect, cipher_init: EVP_CipherInit: set key failed for aes128-cbc [preauth] Starting the daemon in debug mode below. If I change the first cipher offered to blowfish, it works. /usr/sbin/sshd -ddd debug2: load_server_config: filename /etc/ssh/sshd_config debug2: load_server_config: done config len = 219 debug2: parse_server_config: config /etc/ssh/sshd_config len 219 debug3: /etc/ssh/sshd_config:54 setting AuthorizedKeysFile .ssh/authorized_keys debug3: /etc/ssh/sshd_config:122 setting Subsystem sftp /usr/libexec/sftp-server debug1: HPN Buffer Size: 131072 debug1: sshd version OpenSSH_6.1p1_hpn13v11 FreeBSD-20120901 debug3: Incorrect RSA1 identifier debug1: read PEM private key done: type RSA debug1: private host key: #0 type 1 RSA debug3: Incorrect RSA1 identifier debug1: read PEM private key done: type DSA debug1: private host key: #1 type 2 DSA debug3: Incorrect RSA1 identifier debug1: read PEM private key done: type ECDSA debug1: private host key: #2 type 3 ECDSA debug1: rexec_argv[0]='/usr/sbin/sshd' debug1: rexec_argv[1]='-ddd' debug2: fd 4 setting O_NONBLOCK debug3: ssh_sock_set_v6only: set socket 4 IPV6_V6ONLY debug1: Bind to port 22 on ::. debug1: Server TCP RWIN socket size: 131072 debug1: HPN Buffer Size: 131072 Server listening on :: port 22. debug2: fd 5 setting O_NONBLOCK debug1: Bind to port 22 on 0.0.0.0. debug1: Server TCP RWIN socket size: 131072 debug1: HPN Buffer Size: 131072 Server listening on 0.0.0.0 port 22. debug1: fd 6 clearing O_NONBLOCK debug1: Server will not fork when running in debugging mode. debug3: send_rexec_state: entering fd = 9 config len 219 debug3: ssh_msg_send: type 0 debug3: send_rexec_state: done debug1: rexec start in 6 out 6 newsock 6 pipe -1 sock 9 debug1: inetd sockets after dupping: 4, 4 debug1: res_init() Connection from 2607:f3e0:0:4:f025:8813:7603:7e4a port 52567 debug1: HPN Disabled: 0, HPN Buffer Size: 131072 debug1: Client protocol version 2.0; client software version SecureCRT_6.6.1 (x64 build 289) SecureCRT debug1: no match: SecureCRT_6.6.1 (x64 build 289) SecureCRT debug1: Enabling compatibility mode for protocol 2.0 debug1: Local version string SSH-2.0-OpenSSH_6.1_hpn13v11 FreeBSD-20120901 debug2: fd 4 setting O_NONBLOCK debug3: ssh_sandbox_init: preparing rlimit sandbox debug2: Network child is on pid 2667 debug3: preauth child monitor started debug3: privsep user:group 22:22 [preauth] debug1: permanently_set_uid: 22/22 [preauth] debug1: list_hostkey_types: ssh-rsa,ssh-dss,ecdsa-sha2-nistp256 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] debug2: kex_parse_kexinit: ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 [preauth] debug2: kex_parse_kexinit: ssh-rsa,ssh-dss,ecdsa-sha2-nistp256 [preauth] debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc at lysator.liu.se [preauth] debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc at lysator.liu.se [preauth] debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64 at openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96 [preauth] debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64 at openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96 [preauth] debug2: kex_parse_kexinit: none,zlib at openssh.com [preauth] debug2: kex_parse_kexinit: none,zlib at openssh.com [preauth] debug2: kex_parse_kexinit: [preauth] debug2: kex_parse_kexinit: [preauth] debug2: kex_parse_kexinit: first_kex_follows 0 [preauth] debug2: kex_parse_kexinit: reserved 0 [preauth] debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 [preauth] debug2: kex_parse_kexinit: ssh-dss,ssh-rsa,x509v3-sign-rsa,x509v3-sign-dss [preauth] debug2: kex_parse_kexinit: aes128-cbc,aes256-cbc,aes256-ctr,aes192-ctr,aes128-ctr,aes192-cbc,twofish-cbc,blowfish-cbc,3des-cbc,arcfour [preauth] debug2: kex_parse_kexinit: aes128-cbc,aes256-cbc,aes256-ctr,aes192-ctr,aes128-ctr,aes192-cbc,twofish-cbc,blowfish-cbc,3des-cbc,arcfour [preauth] debug2: kex_parse_kexinit: hmac-sha1,hmac-sha1-96,hmac-md5,hmac-md5-96,umac-64 at openssh.com [preauth] debug2: kex_parse_kexinit: hmac-sha1,hmac-sha1-96,hmac-md5,hmac-md5-96,umac-64 at openssh.com [preauth] debug2: kex_parse_kexinit: none [preauth] debug2: kex_parse_kexinit: none [preauth] debug2: kex_parse_kexinit: [preauth] debug2: kex_parse_kexinit: [preauth] debug2: kex_parse_kexinit: first_kex_follows 0 [preauth] debug2: kex_parse_kexinit: reserved 0 [preauth] debug2: mac_setup: found hmac-sha1 [preauth] debug1: kex: client->server aes128-cbc hmac-sha1 none [preauth] debug2: mac_setup: found hmac-sha1 [preauth] debug1: kex: server->client aes128-cbc hmac-sha1 none [preauth] debug1: SSH2_MSG_KEX_DH_GEX_REQUEST received [preauth] debug3: mm_request_send entering: type 0 [preauth] debug3: mm_choose_dh: waiting for MONITOR_ANS_MODULI [preauth] debug3: mm_request_receive_expect entering: type 1 [preauth] debug3: mm_request_receive entering [preauth] debug3: mm_request_receive entering debug3: monitor_read: checking request 0 debug3: mm_answer_moduli: got parameters: 1024 2048 2048 debug3: mm_request_send entering: type 1 debug2: monitor_read: 0 used once, disabling now debug3: mm_choose_dh: remaining 0 [preauth] debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent [preauth] debug2: dh_gen_key: priv key bits set: 181/320 [preauth] debug2: bits set: 1008/2048 [preauth] debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT [preauth] debug2: bits set: 1009/2048 [preauth] debug3: mm_key_sign entering [preauth] debug3: mm_request_send entering: type 4 [preauth] debug3: mm_key_sign: waiting for MONITOR_ANS_SIGN [preauth] debug3: mm_request_receive_expect entering: type 5 [preauth] debug3: mm_request_receive entering [preauth] debug3: mm_request_receive entering debug3: monitor_read: checking request 4 debug3: mm_answer_sign debug3: mm_answer_sign: signature 0x803017180(55) debug3: mm_request_send entering: type 5 debug2: monitor_read: 4 used once, disabling now debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent [preauth] debug2: kex_derive_keys [preauth] debug2: set_newkeys: mode 1 [preauth] cipher_init: EVP_CipherInit: set key failed for aes128-cbc [preauth] debug1: do_cleanup [preauth] debug3: PAM: sshpam_thread_cleanup entering [preauth] debug3: mm_request_receive entering debug1: do_cleanup debug3: PAM: sshpam_thread_cleanup entering debug1: Killing privsep child 2667 -- ------------------- Mike Tancsa, tel +1 519 651 3400 Sentex Communications, mike at sentex.net Providing Internet services since 1994 www.sentex.net Cambridge, Ontario Canada http://www.tancsa.com/
Mike Tancsa
2013-Mar-01 17:48 UTC
svn commit: r247485 - in stable/9: crypto/openssh crypto/openssh/openbsd-compat secure/lib/libssh secure/usr.sbin/sshd
On 3/1/2013 11:35 AM, Mike Tancsa wrote:> On 2/28/2013 1:43 PM, Dag-Erling Sm?rgrav wrote: >> Author: des >> Date: Thu Feb 28 18:43:50 2013 >> New Revision: 247485 >> URL: http://svnweb.freebsd.org/changeset/base/247485 >> >> Log: >> Pull in OpenSSH 6.1 from head. > > Hi, > I updated a box to RELENG_9 with this change, and I can no longer ssh > from my secure crt client. I have a stock sshd_config, but when I connect, > > cipher_init: EVP_CipherInit: set key failed for aes128-cbc [preauth]OK, so it looks like something to do with hardware crypto. If I unload aesni.ko and restart sshd, it works, even with aes128-cbc which I guess it was trying to use cryptodev ---Mike -- ------------------- Mike Tancsa, tel +1 519 651 3400 Sentex Communications, mike at sentex.net Providing Internet services since 1994 www.sentex.net Cambridge, Ontario Canada http://www.tancsa.com/
Mike Tancsa
2013-May-29 13:30 UTC
Re: svn commit: r247485 - in stable/9: crypto/openssh crypto/openssh/openbsd-compat secure/lib/libssh secure/usr.sbin/sshd
On 3/1/2013 11:35 AM, Mike Tancsa wrote:> On 2/28/2013 1:43 PM, Dag-Erling Smørgrav wrote: >> Author: des >> Date: Thu Feb 28 18:43:50 2013 >> New Revision: 247485 >> URL: http://svnweb.freebsd.org/changeset/base/247485 >> >> Log: >> Pull in OpenSSH 6.1 from head. > > Hi, > I updated a box to RELENG_9 with this change, and I can no longer ssh > from my secure crt client. I have a stock sshd_config, but when I connect, > > cipher_init: EVP_CipherInit: set key failed for aes128-cbc [preauth]For the archives, this is fixed in http://lists.freebsd.org/pipermail/svn-src-head/2013-May/047921.html It can be worked around by setting UsePrivilegeSeparation yes in /etc/ssh/sshd_config The default behind the scenes was changed to UsePrivilegeSeparation sandbox See the above thread for more information. ---Mike> > Starting the daemon in debug mode below. If I change the first cipher > offered to blowfish, it works. > > /usr/sbin/sshd -ddd > debug2: load_server_config: filename /etc/ssh/sshd_config > debug2: load_server_config: done config len = 219 > debug2: parse_server_config: config /etc/ssh/sshd_config len 219 > debug3: /etc/ssh/sshd_config:54 setting AuthorizedKeysFile > .ssh/authorized_keys > debug3: /etc/ssh/sshd_config:122 setting Subsystem sftp > /usr/libexec/sftp-server > debug1: HPN Buffer Size: 131072 > debug1: sshd version OpenSSH_6.1p1_hpn13v11 FreeBSD-20120901 > debug3: Incorrect RSA1 identifier > debug1: read PEM private key done: type RSA > debug1: private host key: #0 type 1 RSA > debug3: Incorrect RSA1 identifier > debug1: read PEM private key done: type DSA > debug1: private host key: #1 type 2 DSA > debug3: Incorrect RSA1 identifier > debug1: read PEM private key done: type ECDSA > debug1: private host key: #2 type 3 ECDSA > debug1: rexec_argv[0]=''/usr/sbin/sshd'' > debug1: rexec_argv[1]=''-ddd'' > debug2: fd 4 setting O_NONBLOCK > debug3: ssh_sock_set_v6only: set socket 4 IPV6_V6ONLY > debug1: Bind to port 22 on ::. > debug1: Server TCP RWIN socket size: 131072 > debug1: HPN Buffer Size: 131072 > Server listening on :: port 22. > debug2: fd 5 setting O_NONBLOCK > debug1: Bind to port 22 on 0.0.0.0. > debug1: Server TCP RWIN socket size: 131072 > debug1: HPN Buffer Size: 131072 > Server listening on 0.0.0.0 port 22. > debug1: fd 6 clearing O_NONBLOCK > debug1: Server will not fork when running in debugging mode. > debug3: send_rexec_state: entering fd = 9 config len 219 > debug3: ssh_msg_send: type 0 > debug3: send_rexec_state: done > debug1: rexec start in 6 out 6 newsock 6 pipe -1 sock 9 > debug1: inetd sockets after dupping: 4, 4 > debug1: res_init() > Connection from 2607:f3e0:0:4:f025:8813:7603:7e4a port 52567 > debug1: HPN Disabled: 0, HPN Buffer Size: 131072 > debug1: Client protocol version 2.0; client software version > SecureCRT_6.6.1 (x64 build 289) SecureCRT > debug1: no match: SecureCRT_6.6.1 (x64 build 289) SecureCRT > debug1: Enabling compatibility mode for protocol 2.0 > debug1: Local version string SSH-2.0-OpenSSH_6.1_hpn13v11 FreeBSD-20120901 > debug2: fd 4 setting O_NONBLOCK > debug3: ssh_sandbox_init: preparing rlimit sandbox > debug2: Network child is on pid 2667 > debug3: preauth child monitor started > debug3: privsep user:group 22:22 [preauth] > debug1: permanently_set_uid: 22/22 [preauth] > debug1: list_hostkey_types: ssh-rsa,ssh-dss,ecdsa-sha2-nistp256 [preauth] > debug1: SSH2_MSG_KEXINIT sent [preauth] > debug1: SSH2_MSG_KEXINIT received [preauth] > debug2: kex_parse_kexinit: > ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 > [preauth] > debug2: kex_parse_kexinit: ssh-rsa,ssh-dss,ecdsa-sha2-nistp256 [preauth] > debug2: kex_parse_kexinit: > aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se > [preauth] > debug2: kex_parse_kexinit: > aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se > [preauth] > debug2: kex_parse_kexinit: > hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 > [preauth] > debug2: kex_parse_kexinit: > hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 > [preauth] > debug2: kex_parse_kexinit: none,zlib@openssh.com [preauth] > debug2: kex_parse_kexinit: none,zlib@openssh.com [preauth] > debug2: kex_parse_kexinit: [preauth] > debug2: kex_parse_kexinit: [preauth] > debug2: kex_parse_kexinit: first_kex_follows 0 [preauth] > debug2: kex_parse_kexinit: reserved 0 [preauth] > debug2: kex_parse_kexinit: > diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 > [preauth] > debug2: kex_parse_kexinit: > ssh-dss,ssh-rsa,x509v3-sign-rsa,x509v3-sign-dss [preauth] > debug2: kex_parse_kexinit: > aes128-cbc,aes256-cbc,aes256-ctr,aes192-ctr,aes128-ctr,aes192-cbc,twofish-cbc,blowfish-cbc,3des-cbc,arcfour > [preauth] > debug2: kex_parse_kexinit: > aes128-cbc,aes256-cbc,aes256-ctr,aes192-ctr,aes128-ctr,aes192-cbc,twofish-cbc,blowfish-cbc,3des-cbc,arcfour > [preauth] > debug2: kex_parse_kexinit: > hmac-sha1,hmac-sha1-96,hmac-md5,hmac-md5-96,umac-64@openssh.com [preauth] > debug2: kex_parse_kexinit: > hmac-sha1,hmac-sha1-96,hmac-md5,hmac-md5-96,umac-64@openssh.com [preauth] > debug2: kex_parse_kexinit: none [preauth] > debug2: kex_parse_kexinit: none [preauth] > debug2: kex_parse_kexinit: [preauth] > debug2: kex_parse_kexinit: [preauth] > debug2: kex_parse_kexinit: first_kex_follows 0 [preauth] > debug2: kex_parse_kexinit: reserved 0 [preauth] > debug2: mac_setup: found hmac-sha1 [preauth] > debug1: kex: client->server aes128-cbc hmac-sha1 none [preauth] > debug2: mac_setup: found hmac-sha1 [preauth] > debug1: kex: server->client aes128-cbc hmac-sha1 none [preauth] > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST received [preauth] > debug3: mm_request_send entering: type 0 [preauth] > debug3: mm_choose_dh: waiting for MONITOR_ANS_MODULI [preauth] > debug3: mm_request_receive_expect entering: type 1 [preauth] > debug3: mm_request_receive entering [preauth] > debug3: mm_request_receive entering > debug3: monitor_read: checking request 0 > debug3: mm_answer_moduli: got parameters: 1024 2048 2048 > debug3: mm_request_send entering: type 1 > debug2: monitor_read: 0 used once, disabling now > debug3: mm_choose_dh: remaining 0 [preauth] > debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent [preauth] > debug2: dh_gen_key: priv key bits set: 181/320 [preauth] > debug2: bits set: 1008/2048 [preauth] > debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT [preauth] > debug2: bits set: 1009/2048 [preauth] > debug3: mm_key_sign entering [preauth] > debug3: mm_request_send entering: type 4 [preauth] > debug3: mm_key_sign: waiting for MONITOR_ANS_SIGN [preauth] > debug3: mm_request_receive_expect entering: type 5 [preauth] > debug3: mm_request_receive entering [preauth] > debug3: mm_request_receive entering > debug3: monitor_read: checking request 4 > debug3: mm_answer_sign > debug3: mm_answer_sign: signature 0x803017180(55) > debug3: mm_request_send entering: type 5 > debug2: monitor_read: 4 used once, disabling now > debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent [preauth] > debug2: kex_derive_keys [preauth] > debug2: set_newkeys: mode 1 [preauth] > cipher_init: EVP_CipherInit: set key failed for aes128-cbc [preauth] > debug1: do_cleanup [preauth] > debug3: PAM: sshpam_thread_cleanup entering [preauth] > debug3: mm_request_receive entering > debug1: do_cleanup > debug3: PAM: sshpam_thread_cleanup entering > debug1: Killing privsep child 2667 > >-- ------------------- Mike Tancsa, tel +1 519 651 3400 Sentex Communications, mike@sentex.net Providing Internet services since 1994 www.sentex.net Cambridge, Ontario Canada http://www.tancsa.com/ _______________________________________________ freebsd-stable@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-stable To unsubscribe, send any mail to "freebsd-stable-unsubscribe@freebsd.org"
Mike Tancsa
2013-May-29 13:30 UTC
svn commit: r247485 - in stable/9: crypto/openssh crypto/openssh/openbsd-compat secure/lib/libssh secure/usr.sbin/sshd
On 3/1/2013 11:35 AM, Mike Tancsa wrote:> On 2/28/2013 1:43 PM, Dag-Erling Sm?rgrav wrote: >> Author: des >> Date: Thu Feb 28 18:43:50 2013 >> New Revision: 247485 >> URL: http://svnweb.freebsd.org/changeset/base/247485 >> >> Log: >> Pull in OpenSSH 6.1 from head. > > Hi, > I updated a box to RELENG_9 with this change, and I can no longer ssh > from my secure crt client. I have a stock sshd_config, but when I connect, > > cipher_init: EVP_CipherInit: set key failed for aes128-cbc [preauth]For the archives, this is fixed in http://lists.freebsd.org/pipermail/svn-src-head/2013-May/047921.html It can be worked around by setting UsePrivilegeSeparation yes in /etc/ssh/sshd_config The default behind the scenes was changed to UsePrivilegeSeparation sandbox See the above thread for more information. ---Mike> > Starting the daemon in debug mode below. If I change the first cipher > offered to blowfish, it works. > > /usr/sbin/sshd -ddd > debug2: load_server_config: filename /etc/ssh/sshd_config > debug2: load_server_config: done config len = 219 > debug2: parse_server_config: config /etc/ssh/sshd_config len 219 > debug3: /etc/ssh/sshd_config:54 setting AuthorizedKeysFile > .ssh/authorized_keys > debug3: /etc/ssh/sshd_config:122 setting Subsystem sftp > /usr/libexec/sftp-server > debug1: HPN Buffer Size: 131072 > debug1: sshd version OpenSSH_6.1p1_hpn13v11 FreeBSD-20120901 > debug3: Incorrect RSA1 identifier > debug1: read PEM private key done: type RSA > debug1: private host key: #0 type 1 RSA > debug3: Incorrect RSA1 identifier > debug1: read PEM private key done: type DSA > debug1: private host key: #1 type 2 DSA > debug3: Incorrect RSA1 identifier > debug1: read PEM private key done: type ECDSA > debug1: private host key: #2 type 3 ECDSA > debug1: rexec_argv[0]='/usr/sbin/sshd' > debug1: rexec_argv[1]='-ddd' > debug2: fd 4 setting O_NONBLOCK > debug3: ssh_sock_set_v6only: set socket 4 IPV6_V6ONLY > debug1: Bind to port 22 on ::. > debug1: Server TCP RWIN socket size: 131072 > debug1: HPN Buffer Size: 131072 > Server listening on :: port 22. > debug2: fd 5 setting O_NONBLOCK > debug1: Bind to port 22 on 0.0.0.0. > debug1: Server TCP RWIN socket size: 131072 > debug1: HPN Buffer Size: 131072 > Server listening on 0.0.0.0 port 22. > debug1: fd 6 clearing O_NONBLOCK > debug1: Server will not fork when running in debugging mode. > debug3: send_rexec_state: entering fd = 9 config len 219 > debug3: ssh_msg_send: type 0 > debug3: send_rexec_state: done > debug1: rexec start in 6 out 6 newsock 6 pipe -1 sock 9 > debug1: inetd sockets after dupping: 4, 4 > debug1: res_init() > Connection from 2607:f3e0:0:4:f025:8813:7603:7e4a port 52567 > debug1: HPN Disabled: 0, HPN Buffer Size: 131072 > debug1: Client protocol version 2.0; client software version > SecureCRT_6.6.1 (x64 build 289) SecureCRT > debug1: no match: SecureCRT_6.6.1 (x64 build 289) SecureCRT > debug1: Enabling compatibility mode for protocol 2.0 > debug1: Local version string SSH-2.0-OpenSSH_6.1_hpn13v11 FreeBSD-20120901 > debug2: fd 4 setting O_NONBLOCK > debug3: ssh_sandbox_init: preparing rlimit sandbox > debug2: Network child is on pid 2667 > debug3: preauth child monitor started > debug3: privsep user:group 22:22 [preauth] > debug1: permanently_set_uid: 22/22 [preauth] > debug1: list_hostkey_types: ssh-rsa,ssh-dss,ecdsa-sha2-nistp256 [preauth] > debug1: SSH2_MSG_KEXINIT sent [preauth] > debug1: SSH2_MSG_KEXINIT received [preauth] > debug2: kex_parse_kexinit: > ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 > [preauth] > debug2: kex_parse_kexinit: ssh-rsa,ssh-dss,ecdsa-sha2-nistp256 [preauth] > debug2: kex_parse_kexinit: > aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc at lysator.liu.se > [preauth] > debug2: kex_parse_kexinit: > aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc at lysator.liu.se > [preauth] > debug2: kex_parse_kexinit: > hmac-md5,hmac-sha1,umac-64 at openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96 > [preauth] > debug2: kex_parse_kexinit: > hmac-md5,hmac-sha1,umac-64 at openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96 > [preauth] > debug2: kex_parse_kexinit: none,zlib at openssh.com [preauth] > debug2: kex_parse_kexinit: none,zlib at openssh.com [preauth] > debug2: kex_parse_kexinit: [preauth] > debug2: kex_parse_kexinit: [preauth] > debug2: kex_parse_kexinit: first_kex_follows 0 [preauth] > debug2: kex_parse_kexinit: reserved 0 [preauth] > debug2: kex_parse_kexinit: > diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 > [preauth] > debug2: kex_parse_kexinit: > ssh-dss,ssh-rsa,x509v3-sign-rsa,x509v3-sign-dss [preauth] > debug2: kex_parse_kexinit: > aes128-cbc,aes256-cbc,aes256-ctr,aes192-ctr,aes128-ctr,aes192-cbc,twofish-cbc,blowfish-cbc,3des-cbc,arcfour > [preauth] > debug2: kex_parse_kexinit: > aes128-cbc,aes256-cbc,aes256-ctr,aes192-ctr,aes128-ctr,aes192-cbc,twofish-cbc,blowfish-cbc,3des-cbc,arcfour > [preauth] > debug2: kex_parse_kexinit: > hmac-sha1,hmac-sha1-96,hmac-md5,hmac-md5-96,umac-64 at openssh.com [preauth] > debug2: kex_parse_kexinit: > hmac-sha1,hmac-sha1-96,hmac-md5,hmac-md5-96,umac-64 at openssh.com [preauth] > debug2: kex_parse_kexinit: none [preauth] > debug2: kex_parse_kexinit: none [preauth] > debug2: kex_parse_kexinit: [preauth] > debug2: kex_parse_kexinit: [preauth] > debug2: kex_parse_kexinit: first_kex_follows 0 [preauth] > debug2: kex_parse_kexinit: reserved 0 [preauth] > debug2: mac_setup: found hmac-sha1 [preauth] > debug1: kex: client->server aes128-cbc hmac-sha1 none [preauth] > debug2: mac_setup: found hmac-sha1 [preauth] > debug1: kex: server->client aes128-cbc hmac-sha1 none [preauth] > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST received [preauth] > debug3: mm_request_send entering: type 0 [preauth] > debug3: mm_choose_dh: waiting for MONITOR_ANS_MODULI [preauth] > debug3: mm_request_receive_expect entering: type 1 [preauth] > debug3: mm_request_receive entering [preauth] > debug3: mm_request_receive entering > debug3: monitor_read: checking request 0 > debug3: mm_answer_moduli: got parameters: 1024 2048 2048 > debug3: mm_request_send entering: type 1 > debug2: monitor_read: 0 used once, disabling now > debug3: mm_choose_dh: remaining 0 [preauth] > debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent [preauth] > debug2: dh_gen_key: priv key bits set: 181/320 [preauth] > debug2: bits set: 1008/2048 [preauth] > debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT [preauth] > debug2: bits set: 1009/2048 [preauth] > debug3: mm_key_sign entering [preauth] > debug3: mm_request_send entering: type 4 [preauth] > debug3: mm_key_sign: waiting for MONITOR_ANS_SIGN [preauth] > debug3: mm_request_receive_expect entering: type 5 [preauth] > debug3: mm_request_receive entering [preauth] > debug3: mm_request_receive entering > debug3: monitor_read: checking request 4 > debug3: mm_answer_sign > debug3: mm_answer_sign: signature 0x803017180(55) > debug3: mm_request_send entering: type 5 > debug2: monitor_read: 4 used once, disabling now > debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent [preauth] > debug2: kex_derive_keys [preauth] > debug2: set_newkeys: mode 1 [preauth] > cipher_init: EVP_CipherInit: set key failed for aes128-cbc [preauth] > debug1: do_cleanup [preauth] > debug3: PAM: sshpam_thread_cleanup entering [preauth] > debug3: mm_request_receive entering > debug1: do_cleanup > debug3: PAM: sshpam_thread_cleanup entering > debug1: Killing privsep child 2667 > >-- ------------------- Mike Tancsa, tel +1 519 651 3400 Sentex Communications, mike at sentex.net Providing Internet services since 1994 www.sentex.net Cambridge, Ontario Canada http://www.tancsa.com/