Running "ls" on a large directory (/usr/bin) locks the term when using
protocol 2.0. A tilde works to escape the session.
Client: OpenSSH_2.9p2 on NetBSD
Server: OpenSSH_2.3.0 on FreeBSD
Output of ssh -v <FreeBSD host>:
OpenSSH_2.9p2, SSH protocols 1.5/2.0, OpenSSL 0x0090602f
debug1: Seeding random number generator
debug1: Rhosts Authentication disabled, originating port will not be trusted.
debug1: restore_uid
debug1: ssh_connect: getuid 0 geteuid 0 anon 1
debug1: Connecting to myhost [my_ip] port 22.
debug1: restore_uid
debug1: restore_uid
debug1: Connection established.
debug1: read PEM private key done: type DSA
debug1: identity file /net/u/1/j/jasonm/.ssh/identity type 0
debug1: identity file /net/u/1/j/jasonm/.ssh/id_rsa type -1
debug1: identity file /net/u/1/j/jasonm/.ssh/id_dsa type -1
debug1: Remote protocol version 1.99, remote software version OpenSSH_2.3.0
FreeBSD localisations 20010713
debug1: match: OpenSSH_2.3.0 FreeBSD localisations 20010713 pat ^OpenSSH_2\.3\.0
Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_2.9p2
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug1: kex: server->client 3des-cbc hmac-md5 none
debug1: kex: client->server 3des-cbc hmac-md5 none
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST_OLD sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
debug1: dh_gen_key: priv key bits set: 193/384
debug1: bits set: 1034/2049
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
debug1: Host 'myhost' is known and matches the DSA host key.
debug1: Found key in /net/u/1/j/jasonm/.ssh/known_hosts2:1
debug1: bits set: 1012/2049
debug1: len 55 datafellows 53376
debug1: ssh_dss_verify: signature correct
debug1: kex_derive_keys
debug1: newkeys: mode 1
debug1: SSH2_MSG_NEWKEYS sent
debug1: waiting for SSH2_MSG_NEWKEYS
debug1: newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: done: ssh_kex2.
debug1: send SSH2_MSG_SERVICE_REQUEST
debug1: service_accept: ssh-userauth
debug1: got SSH2_MSG_SERVICE_ACCEPT
debug1: authentications that can continue: publickey,password
debug1: next auth method to try is publickey
debug1: try privkey: /net/u/1/j/jasonm/.ssh/id_rsa
debug1: try privkey: /net/u/1/j/jasonm/.ssh/id_dsa
debug1: next auth method to try is password
--
With all the fancy scientists in the world, why can't they just once
build a nuclear balm?