bugzilla-daemon at mindrot.org
2006-Feb-14 11:17 UTC
[Bug 1131] buffer_append_space: alloc not supported Error with V 4.2p1
http://bugzilla.mindrot.org/show_bug.cgi?id=1131 ------- Comment #5 from dtucker at zip.com.au 2006-02-14 22:17 ------- Also, what compiler did you use to compile OpenSSH? If you compile OpenSSH (and openssl and zlib if possible) with optimization disabled (-O0) does the error still occur? ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
bugzilla-daemon at mindrot.org
2006-Feb-15 18:56 UTC
[Bug 1131] buffer_append_space: alloc not supported Error with V 4.2p1
http://bugzilla.mindrot.org/show_bug.cgi?id=1131 ------- Comment #6 from cove at wildpackets.com 2006-02-16 05:56 ------- Created an attachment (id=1071) --> (http://bugzilla.mindrot.org/attachment.cgi?id=1071&action=view) Apparent fix for bug 1135 against openssh-4.3p2. ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
bugzilla-daemon at mindrot.org
2006-Feb-15 19:02 UTC
[Bug 1131] buffer_append_space: alloc not supported Error with V 4.2p1
http://bugzilla.mindrot.org/show_bug.cgi?id=1131 ------- Comment #7 from cove at wildpackets.com 2006-02-16 06:02 ------- (From update of attachment 1071) It appears this can happen when the program being executed on the remote end generates more output than sshd can forward back to the client (ssh2 only, ssh1 is ok). I'm not quite sure why, but the code to throttle the stdout from the program being executed seems to commented out. I'm not quite sure if this patch is correct or not, but it appears to fix the problem for me. ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
bugzilla-daemon at mindrot.org
2006-Feb-15 19:12 UTC
[Bug 1131] buffer_append_space: alloc not supported Error with V 4.2p1
http://bugzilla.mindrot.org/show_bug.cgi?id=1131 cove at wildpackets.com changed: What |Removed |Added ---------------------------------------------------------------------------- Attachment #1071|Apparent fix for bug 1135 |Apparent fix for bug 1131 description|against openssh-4.3p2. |against openssh-4.3p2. ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
bugzilla-daemon at mindrot.org
2006-Feb-15 19:12 UTC
[Bug 1131] buffer_append_space: alloc not supported Error with V 4.2p1
http://bugzilla.mindrot.org/show_bug.cgi?id=1131 cove at wildpackets.com changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |cove at wildpackets.com ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
bugzilla-daemon at mindrot.org
2006-Feb-15 19:43 UTC
[Bug 1131] buffer_append_space: alloc not supported Error with V 4.2p1
http://bugzilla.mindrot.org/show_bug.cgi?id=1131 ------- Comment #8 from cove at wildpackets.com 2006-02-16 06:43 ------- Created an attachment (id=1072) --> (http://bugzilla.mindrot.org/attachment.cgi?id=1072&action=view) Possible way to reproduce the problem. This may reproduce the problem, it's been tricky for some reason. I have tested this by putting the client (genstdout) and test program (sshtest) on separate machines and it's worked for me so far. Which is to say sshd crashes. ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
bugzilla-daemon at mindrot.org
2006-Feb-15 19:48 UTC
[Bug 1131] buffer_append_space: alloc not supported Error with V 4.2p1
http://bugzilla.mindrot.org/show_bug.cgi?id=1131 ------- Comment #9 from lilbird458 at yahoo.com 2006-02-16 06:48 ------- The openssh, openssl and zlib packages that I installed on the system were downloaded from sunfreeware.com. ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
bugzilla-daemon at mindrot.org
2006-Feb-15 21:24 UTC
[Bug 1131] buffer_append_space: alloc not supported Error with V 4.2p1
http://bugzilla.mindrot.org/show_bug.cgi?id=1131 ------- Comment #10 from dtucker at zip.com.au 2006-02-16 08:24 ------- (In reply to comment #7)> (From update of attachment 1071 [edit]) > It appears this can happen when the program being executed on the remote end > generates more output than sshd can forward back to the client (ssh2 only, ssh1 > is ok). I'm not quite sure why, but the code to throttle the stdout from the > program being executed seems to commented out. I'm not quite sure if this patch > is correct or not, but it appears to fix the problem for me.The code in question corresponds to this commit: date: 2001/10/10 05:01:17; author: djm; state: Exp; lines: +8 -4 - markus at cvs.openbsd.org 2001/10/04 15:05:40 [channels.c serverloop.c] comment out bogus conditions for selecting on connection_in although exactly what that means, I have no idea... ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
bugzilla-daemon at mindrot.org
2006-Feb-22 20:57 UTC
[Bug 1131] buffer_append_space: alloc not supported Error with V 4.2p1
http://bugzilla.mindrot.org/show_bug.cgi?id=1131 ------- Comment #11 from cove at wildpackets.com 2006-02-23 07:57 ------- I think that comment may be referring to the "!compat20" in the code. I had to remove that, otherwise I think the routine would be useless. ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
bugzilla-daemon at mindrot.org
2006-Mar-08 09:49 UTC
[Bug 1131] buffer_append_space: alloc not supported Error with V 4.2p1
http://bugzilla.mindrot.org/show_bug.cgi?id=1131 t8m at centrum.cz changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |t8m at centrum.cz ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
bugzilla-daemon at mindrot.org
2006-Mar-08 11:28 UTC
[Bug 1131] buffer_append_space: alloc not supported Error with V 4.2p1
http://bugzilla.mindrot.org/show_bug.cgi?id=1131 ------- Comment #12 from djm at mindrot.org 2006-03-08 22:28 ------- I don't think that patch is correct - it stops ssh or sshd from processing any packets *received* from the network when any channel's *input* buffer is full. This might fix your problem, but if so I believe it would be by accident. Could you please attach a debug trace ("/usr/sbin/sshd -ddde") from a failing session to this bug? ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
bugzilla-daemon at mindrot.org
2006-Mar-08 11:41 UTC
[Bug 1131] buffer_append_space: alloc not supported Error with V 4.2p1
http://bugzilla.mindrot.org/show_bug.cgi?id=1131 ------- Comment #13 from djm at mindrot.org 2006-03-08 22:41 ------- Created an attachment (id=1092) --> (http://bugzilla.mindrot.org/attachment.cgi?id=1092&action=view) Limit remote_maxpacket Please try this diff too - I would also be interested in before and after debug traces regardless of whether it fixes the problem. ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
bugzilla-daemon at mindrot.org
2006-Mar-08 18:03 UTC
[Bug 1131] buffer_append_space: alloc not supported Error with V 4.2p1
http://bugzilla.mindrot.org/show_bug.cgi?id=1131 ------- Comment #14 from cove at wildpackets.com 2006-03-09 05:03 ------- I believe you're right, I wasn't quite sure why turning off all the FDs instead of just the stdin FD appeared to fix the problem, but that might explain it. Unfortunately your patch didn't seem to work for me. The results appear to be the same: Without patch: urg:~/openssh-4.3p2% sudo `pwd`/sshd -p 2200 -ddde debug2: load_server_config: filename /usr/local/etc/sshd_config debug2: load_server_config: done config len = 346 debug2: parse_server_config: config /usr/local/etc/sshd_config len 346 /usr/local/etc/sshd_config line 72: Unsupported option GSSAPIAuthentication /usr/local/etc/sshd_config line 74: Unsupported option GSSAPICleanupCredentials debug1: sshd version OpenSSH_4.3p2 debug1: private host key: #0 type 0 RSA1 debug3: Not a RSA1 key file /usr/local/etc/ssh_host_rsa_key. debug1: read PEM private key done: type RSA debug1: private host key: #1 type 1 RSA debug3: Not a RSA1 key file /usr/local/etc/ssh_host_dsa_key. debug1: read PEM private key done: type DSA debug1: private host key: #2 type 2 DSA debug1: rexec_argv[0]='/home/employees/cove/openssh-4.3p2/sshd' debug1: rexec_argv[1]='-p' debug1: rexec_argv[2]='2200' debug1: rexec_argv[3]='-ddde' debug2: fd 3 setting O_NONBLOCK debug1: Bind to port 2200 on ::. Server listening on :: port 2200. debug2: fd 4 setting O_NONBLOCK debug1: Bind to port 2200 on 0.0.0.0. Bind to port 2200 on 0.0.0.0 failed: Address already in use. Generating 768 bit RSA key. RSA key generation complete. debug3: fd 4 is not O_NONBLOCK debug1: Server will not fork when running in debugging mode. debug3: send_rexec_state: entering fd = 7 config len 346 debug3: ssh_msg_send: type 0 debug3: send_rexec_state: done debug1: rexec start in 4 out 4 newsock 4 pipe -1 sock 7 debug3: recv_rexec_state: entering fd = 5 debug3: ssh_msg_recv entering debug3: recv_rexec_state: done debug2: parse_server_config: config rexec len 346 rexec line 72: Unsupported option GSSAPIAuthentication rexec line 74: Unsupported option GSSAPICleanupCredentials debug1: sshd version OpenSSH_4.3p2 debug1: private host key: #0 type 0 RSA1 debug3: Not a RSA1 key file /usr/local/etc/ssh_host_rsa_key. debug1: read PEM private key done: type RSA debug1: private host key: #1 type 1 RSA debug3: Not a RSA1 key file /usr/local/etc/ssh_host_dsa_key. debug1: read PEM private key done: type DSA debug1: private host key: #2 type 2 DSA debug1: inetd sockets after dupping: 3, 3 debug3: Normalising mapped IPv4 in IPv6 address Connection from 10.4.7.131 port 45020 debug1: Client protocol version 2.0; client software version cryptlib debug1: no match: cryptlib debug1: Enabling compatibility mode for protocol 2.0 debug1: Local version string SSH-1.99-OpenSSH_4.3 debug2: fd 3 setting O_NONBLOCK debug1: list_hostkey_types: ssh-rsa,ssh-dss debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 debug2: kex_parse_kexinit: ssh-rsa,ssh-dss debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc at lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc at lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: none,zlib at openssh.com debug2: kex_parse_kexinit: none,zlib at openssh.com debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: first_kex_follows 0 debug2: kex_parse_kexinit: reserved 0 debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1 debug2: kex_parse_kexinit: ssh-rsa debug2: kex_parse_kexinit: 3des-cbc debug2: kex_parse_kexinit: 3des-cbc debug2: kex_parse_kexinit: hmac-sha1 debug2: kex_parse_kexinit: hmac-sha1 debug2: kex_parse_kexinit: none debug2: kex_parse_kexinit: none debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: first_kex_follows 0 debug2: kex_parse_kexinit: reserved 0 debug2: mac_init: found hmac-sha1 debug1: kex: client->server 3des-cbc hmac-sha1 none debug2: mac_init: found hmac-sha1 debug1: kex: server->client 3des-cbc hmac-sha1 none debug1: SSH2_MSG_KEX_DH_GEX_REQUEST_OLD received debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent debug2: dh_gen_key: priv key bits set: 204/384 debug2: bits set: 539/1024 debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT debug2: bits set: 522/1024 debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent debug2: kex_derive_keys debug2: set_newkeys: mode 1 debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug2: set_newkeys: mode 0 debug1: SSH2_MSG_NEWKEYS received debug1: KEX done debug1: userauth-request for user cove service ssh-connection method password debug1: attempt 0 failures 0 debug2: input_userauth_request: setting up authctxt for cove debug1: PAM: initializing for "cove" debug3: Normalising mapped IPv4 in IPv6 address debug3: Trying to reverse map address 10.4.7.131. debug1: PAM: setting PAM_RHOST to "urg.wildpackets.com" debug1: PAM: setting PAM_TTY to "ssh" debug2: input_userauth_request: try method password debug3: PAM: sshpam_passwd_conv called with 1 messages debug1: PAM: password authentication accepted for cove debug1: do_pam_account: called debug3: PAM: do_pam_account pam_acct_mgmt = 0 (Success) debug3: Normalising mapped IPv4 in IPv6 address Accepted password for cove from 10.4.7.131 port 45020 ssh2 debug1: Entering interactive session for SSH2. debug2: fd 6 setting O_NONBLOCK debug2: fd 7 setting O_NONBLOCK debug1: server_init_dispatch_20 debug1: server_input_channel_open: ctype session rchan 0 win 2147483647 max 16384 debug1: input_session_request debug1: channel 0: new [server-session] debug1: session_new: init debug1: session_new: session 0 debug1: session_open: channel 0 debug1: session_open: session 0: link with channel 0 debug1: server_input_channel_open: confirm session debug1: server_input_channel_req: channel 0 request shell reply 0 debug1: session_by_channel: session 0 channel 0 debug1: session_input_channel_req: session 0 req shell debug1: PAM: establishing credentials debug2: fd 9 setting O_NONBLOCK debug3: fd 9 is O_NONBLOCK debug2: fd 11 setting O_NONBLOCK debug2: channel 0: read 30 from efd 11 debug2: channel 0: rwin 2147483647 elen 30 euse 1 debug2: channel 0: sent ext data 30 debug2: channel 0: read 41 from efd 11 debug2: channel 0: rwin 2147483617 elen 41 euse 1 debug2: channel 0: sent ext data 41 debug2: channel 0: read 40 from efd 11 debug2: channel 0: rwin 2147483576 elen 40 euse 1 debug2: channel 0: sent ext data 40 debug2: channel 0: read 49 from efd 11 debug2: channel 0: rwin 2147483536 elen 49 euse 1 debug2: channel 0: sent ext data 49 debug2: channel 0: read 13 from efd 11 debug2: channel 0: rwin 2147483487 elen 13 euse 1 debug2: channel 0: sent ext data 13 debug2: channel 0: read 12 from efd 11 debug2: channel 0: rwin 2147483474 elen 12 euse 1 debug2: channel 0: sent ext data 12 debug2: channel 0: read 15 from efd 11 debug2: channel 0: rwin 2147483462 elen 15 euse 1 debug2: channel 0: sent ext data 15 debug2: channel 0: read 28 from efd 11 debug2: channel 0: rwin 2147483447 elen 28 euse 1 debug2: channel 0: sent ext data 28 debug2: channel 0: read 52 from efd 11 debug2: channel 0: rwin 2147483419 elen 52 euse 1 debug2: channel 0: sent ext data 52 debug2: channel 0: read 190 from efd 11 debug2: channel 0: rwin 2147483367 elen 190 euse 1 debug2: channel 0: sent ext data 190 Connection closed by 10.4.7.131 debug1: channel 0: free: server-session, nchannels 1 debug3: channel 0: status: The following connections are open: #0 server-session (t4 r0 i0/0 o0/0 fd 9/9 cfd -1) debug3: channel 0: close_fds r 9 w 9 e 11 c -1 debug1: session_close: session 0 pid 11585 debug1: do_cleanup debug1: PAM: cleanup debug3: PAM: sshpam_thread_cleanup entering Closing connection to 10.4.7.131 debug1: PAM: cleanup With limit remote maxpacket patch: urg:~/openssh-4.3p2% sudo `pwd`/sshd -p 2200 -ddde debug2: load_server_config: filename /usr/local/etc/sshd_config debug2: load_server_config: done config len = 346 debug2: parse_server_config: config /usr/local/etc/sshd_config len 346 /usr/local/etc/sshd_config line 72: Unsupported option GSSAPIAuthentication /usr/local/etc/sshd_config line 74: Unsupported option GSSAPICleanupCredentials debug1: sshd version OpenSSH_4.3p2 debug1: private host key: #0 type 0 RSA1 debug3: Not a RSA1 key file /usr/local/etc/ssh_host_rsa_key. debug1: read PEM private key done: type RSA debug1: private host key: #1 type 1 RSA debug3: Not a RSA1 key file /usr/local/etc/ssh_host_dsa_key. debug1: read PEM private key done: type DSA debug1: private host key: #2 type 2 DSA debug1: rexec_argv[0]='/home/employees/cove/openssh-4.3p2/sshd' debug1: rexec_argv[1]='-p' debug1: rexec_argv[2]='2200' debug1: rexec_argv[3]='-ddde' debug2: fd 3 setting O_NONBLOCK debug1: Bind to port 2200 on ::. Server listening on :: port 2200. debug2: fd 4 setting O_NONBLOCK debug1: Bind to port 2200 on 0.0.0.0. Bind to port 2200 on 0.0.0.0 failed: Address already in use. Generating 768 bit RSA key. RSA key generation complete. debug3: fd 4 is not O_NONBLOCK debug1: Server will not fork when running in debugging mode. debug3: send_rexec_state: entering fd = 7 config len 346 debug3: ssh_msg_send: type 0 debug3: send_rexec_state: done debug1: rexec start in 4 out 4 newsock 4 pipe -1 sock 7 debug3: recv_rexec_state: entering fd = 5 debug3: ssh_msg_recv entering debug3: recv_rexec_state: done debug2: parse_server_config: config rexec len 346 rexec line 72: Unsupported option GSSAPIAuthentication rexec line 74: Unsupported option GSSAPICleanupCredentials debug1: sshd version OpenSSH_4.3p2 debug1: private host key: #0 type 0 RSA1 debug3: Not a RSA1 key file /usr/local/etc/ssh_host_rsa_key. debug1: read PEM private key done: type RSA debug1: private host key: #1 type 1 RSA debug3: Not a RSA1 key file /usr/local/etc/ssh_host_dsa_key. debug1: read PEM private key done: type DSA debug1: private host key: #2 type 2 DSA debug1: inetd sockets after dupping: 3, 3 debug3: Normalising mapped IPv4 in IPv6 address Connection from 10.4.7.131 port 45165 debug1: Client protocol version 2.0; client software version cryptlib debug1: no match: cryptlib debug1: Enabling compatibility mode for protocol 2.0 debug1: Local version string SSH-1.99-OpenSSH_4.3 debug2: fd 3 setting O_NONBLOCK debug1: list_hostkey_types: ssh-rsa,ssh-dss debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 debug2: kex_parse_kexinit: ssh-rsa,ssh-dss debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc at lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc at lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: none,zlib at openssh.com debug2: kex_parse_kexinit: none,zlib at openssh.com debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: first_kex_follows 0 debug2: kex_parse_kexinit: reserved 0 debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1 debug2: kex_parse_kexinit: ssh-rsa debug2: kex_parse_kexinit: 3des-cbc debug2: kex_parse_kexinit: 3des-cbc debug2: kex_parse_kexinit: hmac-sha1 debug2: kex_parse_kexinit: hmac-sha1 debug2: kex_parse_kexinit: none debug2: kex_parse_kexinit: none debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: first_kex_follows 0 debug2: kex_parse_kexinit: reserved 0 debug2: mac_init: found hmac-sha1 debug1: kex: client->server 3des-cbc hmac-sha1 none debug2: mac_init: found hmac-sha1 debug1: kex: server->client 3des-cbc hmac-sha1 none debug1: SSH2_MSG_KEX_DH_GEX_REQUEST_OLD received debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent debug2: dh_gen_key: priv key bits set: 190/384 debug2: bits set: 530/1024 debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT debug2: bits set: 492/1024 debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent debug2: kex_derive_keys debug2: set_newkeys: mode 1 debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug2: set_newkeys: mode 0 debug1: SSH2_MSG_NEWKEYS received debug1: KEX done debug1: userauth-request for user cove service ssh-connection method password debug1: attempt 0 failures 0 debug2: input_userauth_request: setting up authctxt for cove debug1: PAM: initializing for "cove" debug3: Normalising mapped IPv4 in IPv6 address debug3: Trying to reverse map address 10.4.7.131. debug1: PAM: setting PAM_RHOST to "urg.wildpackets.com" debug1: PAM: setting PAM_TTY to "ssh" debug2: input_userauth_request: try method password debug3: PAM: sshpam_passwd_conv called with 1 messages debug1: PAM: password authentication accepted for cove debug1: do_pam_account: called debug3: PAM: do_pam_account pam_acct_mgmt = 0 (Success) debug3: Normalising mapped IPv4 in IPv6 address Accepted password for cove from 10.4.7.131 port 45165 ssh2 debug1: Entering interactive session for SSH2. debug2: fd 6 setting O_NONBLOCK debug2: fd 7 setting O_NONBLOCK debug1: server_init_dispatch_20 debug1: server_input_channel_open: ctype session rchan 0 win 2147483647 max 16384 debug1: input_session_request debug1: channel 0: new [server-session] debug1: session_new: init debug1: session_new: session 0 debug1: session_open: channel 0 debug1: session_open: session 0: link with channel 0 debug1: server_input_channel_open: confirm session debug1: server_input_channel_req: channel 0 request shell reply 0 debug1: session_by_channel: session 0 channel 0 debug1: session_input_channel_req: session 0 req shell debug1: PAM: establishing credentials debug2: fd 9 setting O_NONBLOCK debug3: fd 9 is O_NONBLOCK debug2: fd 11 setting O_NONBLOCK debug2: channel 0: read 30 from efd 11 debug2: channel 0: rwin 2147483647 elen 30 euse 1 debug2: channel 0: sent ext data 30 debug2: channel 0: read 41 from efd 11 debug2: channel 0: rwin 2147483617 elen 41 euse 1 debug2: channel 0: sent ext data 41 debug2: channel 0: read 40 from efd 11 debug2: channel 0: rwin 2147483576 elen 40 euse 1 debug2: channel 0: sent ext data 40 debug2: channel 0: read 49 from efd 11 debug2: channel 0: rwin 2147483536 elen 49 euse 1 debug2: channel 0: sent ext data 49 debug2: channel 0: read 13 from efd 11 debug2: channel 0: rwin 2147483487 elen 13 euse 1 debug2: channel 0: sent ext data 13 debug2: channel 0: read 12 from efd 11 debug2: channel 0: rwin 2147483474 elen 12 euse 1 debug2: channel 0: sent ext data 12 debug2: channel 0: read 285 from efd 11 debug2: channel 0: rwin 2147483462 elen 285 euse 1 debug2: channel 0: sent ext data 285 Connection closed by 10.4.7.131 debug1: channel 0: free: server-session, nchannels 1 debug3: channel 0: status: The following connections are open: #0 server-session (t4 r0 i0/0 o0/0 fd 9/9 cfd -1) debug3: channel 0: close_fds r 9 w 9 e 11 c -1 debug1: session_close: session 0 pid 16742 debug1: do_cleanup debug1: PAM: cleanup debug3: PAM: sshpam_thread_cleanup entering Closing connection to 10.4.7.131 debug1: PAM: cleanup ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
bugzilla-daemon at mindrot.org
2006-Mar-08 18:49 UTC
[Bug 1131] buffer_append_space: alloc not supported Error with V 4.2p1
http://bugzilla.mindrot.org/show_bug.cgi?id=1131 ------- Comment #15 from cove at wildpackets.com 2006-03-09 05:49 ------- (In reply to comment #14) ...> debug2: channel 0: rwin 2147483367 elen 190 euse 1 > debug2: channel 0: sent ext data 190 > Connection closed by 10.4.7.131NB: at this point the remote end (cryptlib) returns CRYPT_ERROR_TIMEOUT. ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
bugzilla-daemon at mindrot.org
2006-Mar-08 19:35 UTC
[Bug 1131] buffer_append_space: alloc not supported Error with V 4.2p1
http://bugzilla.mindrot.org/show_bug.cgi?id=1131 ------- Comment #16 from cove at wildpackets.com 2006-03-09 06:35 ------- Ok. The reason for the timeout was due to an overloaded machine. Here is what happens with the limit remote maxpacket patch: urg:~/openssh-4.3p2# `pwd`/sshd -p 2200 -ddde debug2: load_server_config: filename /usr/local/etc/sshd_config debug2: load_server_config: done config len = 292 debug2: parse_server_config: config /usr/local/etc/sshd_config len 292 debug1: sshd version OpenSSH_4.3p2 debug1: private host key: #0 type 0 RSA1 debug3: Not a RSA1 key file /usr/local/etc/ssh_host_rsa_key. debug1: read PEM private key done: type RSA debug1: private host key: #1 type 1 RSA debug3: Not a RSA1 key file /usr/local/etc/ssh_host_dsa_key. debug1: read PEM private key done: type DSA debug1: private host key: #2 type 2 DSA debug1: rexec_argv[0]='/home/employees/cove/openssh-4.3p2/sshd' debug1: rexec_argv[1]='-p' debug1: rexec_argv[2]='2200' debug1: rexec_argv[3]='-ddde' debug2: fd 3 setting O_NONBLOCK debug1: Bind to port 2200 on ::. Server listening on :: port 2200. debug2: fd 4 setting O_NONBLOCK debug1: Bind to port 2200 on 0.0.0.0. Bind to port 2200 on 0.0.0.0 failed: Address already in use. Generating 768 bit RSA key. RSA key generation complete. debug3: fd 4 is not O_NONBLOCK debug1: Server will not fork when running in debugging mode. debug3: send_rexec_state: entering fd = 7 config len 292 debug3: ssh_msg_send: type 0 debug3: send_rexec_state: done debug1: rexec start in 4 out 4 newsock 4 pipe -1 sock 7 debug3: recv_rexec_state: entering fd = 5 debug3: ssh_msg_recv entering debug3: recv_rexec_state: done debug2: parse_server_config: config rexec len 292 debug1: sshd version OpenSSH_4.3p2 debug1: private host key: #0 type 0 RSA1 debug3: Not a RSA1 key file /usr/local/etc/ssh_host_rsa_key. debug1: read PEM private key done: type RSA debug1: private host key: #1 type 1 RSA debug3: Not a RSA1 key file /usr/local/etc/ssh_host_dsa_key. debug1: read PEM private key done: type DSA debug1: private host key: #2 type 2 DSA debug1: inetd sockets after dupping: 3, 3 debug3: Normalising mapped IPv4 in IPv6 address Connection from 10.4.58.3 port 60508 debug1: Client protocol version 2.0; client software version cryptlib debug1: no match: cryptlib debug1: Enabling compatibility mode for protocol 2.0 debug1: Local version string SSH-1.99-OpenSSH_4.3 debug2: fd 3 setting O_NONBLOCK debug1: list_hostkey_types: ssh-rsa,ssh-dss debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 debug2: kex_parse_kexinit: ssh-rsa,ssh-dss debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc at lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc at lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: none,zlib at openssh.com debug2: kex_parse_kexinit: none,zlib at openssh.com debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: first_kex_follows 0 debug2: kex_parse_kexinit: reserved 0 debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1 debug2: kex_parse_kexinit: ssh-rsa debug2: kex_parse_kexinit: 3des-cbc debug2: kex_parse_kexinit: 3des-cbc debug2: kex_parse_kexinit: hmac-sha1 debug2: kex_parse_kexinit: hmac-sha1 debug2: kex_parse_kexinit: none debug2: kex_parse_kexinit: none debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: first_kex_follows 0 debug2: kex_parse_kexinit: reserved 0 debug2: mac_init: found hmac-sha1 debug1: kex: client->server 3des-cbc hmac-sha1 none debug2: mac_init: found hmac-sha1 debug1: kex: server->client 3des-cbc hmac-sha1 none debug1: SSH2_MSG_KEX_DH_GEX_REQUEST_OLD received debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent debug2: dh_gen_key: priv key bits set: 200/384 debug2: bits set: 521/1024 debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT debug2: bits set: 530/1024 debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent debug2: kex_derive_keys debug2: set_newkeys: mode 1 debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug2: set_newkeys: mode 0 debug1: SSH2_MSG_NEWKEYS received debug1: KEX done debug1: userauth-request for user cove service ssh-connection method password debug1: attempt 0 failures 0 debug2: input_userauth_request: setting up authctxt for cove debug1: PAM: initializing for "cove" debug3: Normalising mapped IPv4 in IPv6 address debug3: Trying to reverse map address 10.4.58.3. debug1: PAM: setting PAM_RHOST to "xo.wildpackets.com" debug1: PAM: setting PAM_TTY to "ssh" debug2: input_userauth_request: try method password debug3: PAM: sshpam_passwd_conv called with 1 messages debug1: PAM: password authentication accepted for cove debug1: do_pam_account: called debug3: PAM: do_pam_account pam_acct_mgmt = 0 (Success) debug3: Normalising mapped IPv4 in IPv6 address Accepted password for cove from 10.4.58.3 port 60508 ssh2 debug1: Entering interactive session for SSH2. debug2: fd 6 setting O_NONBLOCK debug2: fd 7 setting O_NONBLOCK debug1: server_init_dispatch_20 debug1: server_input_channel_open: ctype session rchan 0 win 2147483647 max 16384 debug1: input_session_request debug1: channel 0: new [server-session] debug1: session_new: init debug1: session_new: session 0 debug1: session_open: channel 0 debug1: session_open: session 0: link with channel 0 debug1: server_input_channel_open: confirm session debug1: server_input_channel_req: channel 0 request shell reply 0 debug1: session_by_channel: session 0 channel 0 debug1: session_input_channel_req: session 0 req shell debug1: PAM: establishing credentials debug2: fd 9 setting O_NONBLOCK debug3: fd 9 is O_NONBLOCK debug2: fd 11 setting O_NONBLOCK debug2: channel 0: read 30 from efd 11 debug2: channel 0: rwin 2147483647 elen 30 euse 1 debug2: channel 0: sent ext data 30 debug2: channel 0: read 41 from efd 11 debug2: channel 0: rwin 2147483617 elen 41 euse 1 debug2: channel 0: sent ext data 41 debug2: channel 0: read 40 from efd 11 debug2: channel 0: rwin 2147483576 elen 40 euse 1 debug2: channel 0: sent ext data 40 debug2: channel 0: read 49 from efd 11 debug2: channel 0: rwin 2147483536 elen 49 euse 1 debug2: channel 0: sent ext data 49 debug2: channel 0: read 13 from efd 11 debug2: channel 0: rwin 2147483487 elen 13 euse 1 debug2: channel 0: sent ext data 13 debug2: channel 0: read 12 from efd 11 debug2: channel 0: rwin 2147483474 elen 12 euse 1 debug2: channel 0: sent ext data 12 debug2: channel 0: read 15 from efd 11 debug2: channel 0: rwin 2147483462 elen 15 euse 1 debug2: channel 0: sent ext data 15 debug2: channel 0: read 28 from efd 11 debug2: channel 0: rwin 2147483447 elen 28 euse 1 debug2: channel 0: sent ext data 28 debug2: channel 0: read 52 from efd 11 debug2: channel 0: rwin 2147483419 elen 52 euse 1 debug2: channel 0: sent ext data 52 debug2: channel 0: read 22 from efd 11 debug2: channel 0: rwin 2147483367 elen 22 euse 1 debug2: channel 0: sent ext data 22 debug2: channel 0: read 166 from efd 11 debug2: channel 0: rwin 2147483345 elen 166 euse 1 debug2: channel 0: sent ext data 166 buffer_append_space: alloc 10522112 not supported debug1: do_cleanup debug1: PAM: cleanup debug3: PAM: sshpam_thread_cleanup entering ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
bugzilla-daemon at mindrot.org
2006-Mar-12 04:04 UTC
[Bug 1131] buffer_append_space: alloc not supported Error with V 4.2p1
http://bugzilla.mindrot.org/show_bug.cgi?id=1131 ------- Comment #17 from djm at mindrot.org 2006-03-12 15:04 ------- Created an attachment (id=1095) --> (http://bugzilla.mindrot.org/attachment.cgi?id=1095&action=view) abort() on buffer errors It looks like the client is sending a bad remote_window value which probably indicates a bug on that side, but we still shouldn't blow up. Could you please try to reproduce the bug with this patch applied and sshd rebuilt with debugging symbols enabled (edit Makefile and append "-g" to CFLAGS if you are using gcc). Run sshd using "sshd -ddder". It should then produce a core file on these buffer error. Please try to get a backtrace from it using gdb or similar. ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.