Nicolas.Williams at ubsw.com
2002-Aug-07 17:17 UTC
Unrelated (was RE: so-called-hang-on-exit)
"ssh -n ..." means ssh will close stdin and open /dev/null for stdin. It does not mean losing th eoutput of ssh. Nico --> -----Original Message----- > From: Eric Garff [mailto:egarff at omniture.com] > Sent: Wednesday, August 07, 2002 12:11 PM > To: openssh-unix-dev at mindrot.org > Subject: Re: Unrelated (was RE: so-called-hang-on-exit) > > > Sadly, no such luck. I need the output, now when I run it by hand the > script hangs because it doesn't get any output whatsoever. Thanks for > the suggestion all the same. > > On Wed, 2002-08-07 at 09:51, Nicolas.Williams at ubsw.com wrote: > > > > Add -n to the ssh command line - see if that fixes it. > > > > Nico > > -- > > > > > -----Original Message----- > > > From: Eric Garff [mailto:egarff at omniture.com] > > > Sent: Wednesday, August 07, 2002 11:15 AM > > > To: openssh-unix-dev at mindrot.org > > > Subject: Re: so-called-hang-on-exit > > > > > > > > > That may be, but it only "hangs" when run from cron, if I run it > > > manually it executes fine, could cron be causing the "hang". > > > Also, if I > > > used Protocol 1 it completes normally. > > > > > > On Tue, 2002-08-06 at 18:13, Frank Cusack wrote: > > > > On Tue, Aug 06, 2002 at 02:32:33PM -0600, Eric Garff wrote: > > > > > This isn't an actual reply to any one person, but here is > > > my experience: > > > > > > > > > > I have tested both the patches by Jani Jaakkol and Frank > > > Cusack (Frank's > > > > > I tried both the pty and non-pty changes). I still get > > > the hang, here > > > > > is my setup. > > > > > > > > > > This is entered as a cronjob on one server to run every > > > 15 minutes: > > > > > > > > > > /home/httpd/bin/cache/glb/gTest > > > >>/home/httpd/bin/cache/glb/gTest.log > > > > > 2>>/home/httpd/bin/cache/glb/gTest.log > > > > > > > > > > here are the guts of the script: > > > > > /usr/local/bin/ssh hostname /bin/ls /some/dir | > /usr/bin/wc -l ; > > > > > /bin/ls /some/other/dir | /usr/bin/wc -l ; /bin/ls > > > /some/other/dir | > > > > > /usr/bin/wc -l" > > > > > > > > > > The script is actually a php script that does a number of > > > other things > > > > > before it executes the ssh (database to grab hostnames, > > > etc.), but that > > > > > is how the ssh portion pans out. After executing the > > > command it then > > > > > starts a 20 second timer, and if the ssh session is still > > > alive, it > > > > > kills it. Also, if I run the script by hand (not crond) > > > it completes > > > > > just fine (no hang). > > > > > > > > > > Any ideas? Your time is MUCH appreciated. > > > > > > > > You're doing something wrong. Your ssh command is not > an example of > > > > the hang-on-exit problem. > > > > > > > > /fc > > > -- > > > Eric Garff > > > System Administrator > > > egarff at omniture.com > > > 801.722.0134 > > > > > > Omniture > > > http://www.omniture.com > > > "Unique Questions, Precise Answers" > > > _______________________________________________ > > > openssh-unix-dev at mindrot.org mailing list > > > http://www.mindrot.org/mailman/listinfo/openssh-unix-dev > > > > > > > Visit our website at http://www.ubswarburg.com > > > > This message contains confidential information and is intended only > > for the individual named. If you are not the named addressee you > > should not disseminate, distribute or copy this e-mail. Please > > notify the sender immediately by e-mail if you have received this > > e-mail by mistake and delete this e-mail from your system. > > > > E-mail transmission cannot be guaranteed to be secure or error-free > > as information could be intercepted, corrupted, lost, destroyed, > > arrive late or incomplete, or contain viruses. The sender > therefore > > does not accept liability for any errors or omissions in > the contents > > of this message which arise as a result of e-mail transmission. If > > verification is required please request a hard-copy version. This > > message is provided for informational purposes and should not be > > construed as a solicitation or offer to buy or sell any > securities or > > related financial instruments. > -- > Eric Garff > System Administrator > egarff at omniture.com > 801.722.0134 > > Omniture > http://www.omniture.com > "Unique Questions, Precise Answers" > _______________________________________________ > openssh-unix-dev at mindrot.org mailing list > http://www.mindrot.org/mailman/listinfo/openssh-unix-dev >Visit our website at http://www.ubswarburg.com This message contains confidential information and is intended only for the individual named. If you are not the named addressee you should not disseminate, distribute or copy this e-mail. Please notify the sender immediately by e-mail if you have received this e-mail by mistake and delete this e-mail from your system. E-mail transmission cannot be guaranteed to be secure or error-free as information could be intercepted, corrupted, lost, destroyed, arrive late or incomplete, or contain viruses. The sender therefore does not accept liability for any errors or omissions in the contents of this message which arise as a result of e-mail transmission. If verification is required please request a hard-copy version. This message is provided for informational purposes and should not be construed as a solicitation or offer to buy or sell any securities or related financial instruments.
Ok, this is going to be a long email (therefore I apologize in advance, but I figured this may help), but here is my debug data first will be the "ssh -v -v -v" both command line execution, then cron run, followed by the sshd with the LogLevel DEBUG3 set (command line execution and cron execution respectively), it hangs every time with the cron ssh execution: --------------------ssh run from command line----------------------- dev13: OpenSSH_3.4p1, SSH protocols 1.5/2.0, OpenSSL 0x0090603f debug1: Reading configuration data /etc/ssh_config debug1: Rhosts Authentication disabled, originating port will not be trusted. debug1: ssh_connect: needpriv 0 debug1: Connecting to dev13 [10.10.0.113] port 22. debug1: Connection established. debug1: identity file /home/glb/.ssh/identity type 0 debug1: identity file /home/glb/.ssh/id_rsa type -1 debug3: Not a RSA1 key file /home/glb/.ssh/id_dsa. debug2: key_type_from_name: unknown key type '-----BEGIN' debug3: key_read: no key found debug3: key_read: no space debug3: key_read: no space debug3: key_read: no space debug3: key_read: no space debug3: key_read: no space debug3: key_read: no space debug3: key_read: no space debug3: key_read: no space debug3: key_read: no space debug3: key_read: no space debug2: key_type_from_name: unknown key type '-----END' debug3: key_read: no key found debug1: identity file /home/glb/.ssh/id_dsa type 2 debug1: Remote protocol version 2.0, remote software version OpenSSH_3.4p1 debug1: match: OpenSSH_3.4p1 pat OpenSSH* Enabling compatibility mode for protocol 2.0 debug1: Local version string SSH-2.0-OpenSSH_3.4p1 debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 debug2: kex_parse_kexinit: ssh-rsa,ssh-dss debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc at lysator.liu.se debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc at lysator.liu.se debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: none debug2: kex_parse_kexinit: none debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: first_kex_follows 0 debug2: kex_parse_kexinit: reserved 0 debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 debug2: kex_parse_kexinit: ssh-dss debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc at lysator.liu.se debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc at lysator.liu.se debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: none,zlib debug2: kex_parse_kexinit: none,zlib debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: first_kex_follows 0 debug2: kex_parse_kexinit: reserved 0 debug2: mac_init: found hmac-md5 debug1: kex: server->client aes128-cbc hmac-md5 none debug2: mac_init: found hmac-md5 debug1: kex: client->server aes128-cbc hmac-md5 none debug1: SSH2_MSG_KEX_DH_GEX_REQUEST sent debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP debug1: dh_gen_key: priv key bits set: 139/256 debug1: bits set: 1582/3191 debug1: SSH2_MSG_KEX_DH_GEX_INIT sent debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY debug3: check_host_in_hostfile: filename /home/glb/.ssh/known_hosts debug3: check_host_in_hostfile: match line 1 debug3: check_host_in_hostfile: filename /home/glb/.ssh/known_hosts debug3: check_host_in_hostfile: match line 1 debug1: Host 'dev13' is known and matches the DSA host key. debug1: Found key in /home/glb/.ssh/known_hosts:1 debug1: bits set: 1601/3191 debug1: ssh_dss_verify: signature correct debug1: kex_derive_keys debug1: newkeys: mode 1 debug1: SSH2_MSG_NEWKEYS sent debug1: waiting for SSH2_MSG_NEWKEYS debug1: newkeys: mode 0 debug1: SSH2_MSG_NEWKEYS received debug1: done: ssh_kex2. debug1: send SSH2_MSG_SERVICE_REQUEST debug1: service_accept: ssh-userauth debug1: got SSH2_MSG_SERVICE_ACCEPT debug1: authentications that can continue: publickey,password,keyboard-interactive debug3: start over, passed a different list publickey,password,keyboard-interactive debug3: preferred publickey,keyboard-interactive,password debug3: authmethod_lookup publickey debug3: remaining preferred: keyboard-interactive,password debug3: authmethod_is_enabled publickey debug1: next auth method to try is publickey debug1: try privkey: /home/glb/.ssh/id_rsa debug3: no such identity: /home/glb/.ssh/id_rsa debug1: try pubkey: /home/glb/.ssh/id_dsa debug3: send_pubkey_test debug2: we sent a publickey packet, wait for reply debug1: input_userauth_pk_ok: pkalg ssh-dss blen 434 lastkey 0x81011d0 hint 2 debug2: input_userauth_pk_ok: fp 25:48:a7:14:e6:a0:b6:67:b2:b4:d6:a0:be:b3:98:8bdebug3: sign_and_send_pubkey debug1: read PEM private key done: type DSA debug1: ssh-userauth2 successful: method publickey debug1: fd 6 setting O_NONBLOCK debug1: channel 0: new [client-session] debug3: ssh_session2_open: channel_new: 0 debug1: send channel open 0 debug1: Entering interactive session. debug2: callback start debug1: ssh_session2_setup: id 0 debug1: Sending command: /bin/ls /usr/local/apache/logs/superstats/inserts | /usr/bin/wc -l;/bin/ls /home/glb/ready | /usr/bin/wc -l;/bin/ls /home/glb/stats | /usr/bin/wc -l debug1: channel request 0: exec debug2: callback done debug1: channel 0: open confirm rwindow 0 rmax 32768 debug2: channel 0: rcvd adjust 131072 debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: channel 0: rcvd eof debug1: channel 0: output open -> drain debug1: channel 0: obuf empty debug1: channel 0: close_write debug1: channel 0: output drain -> closed debug1: channel 0: rcvd close debug1: channel 0: close_read debug1: channel 0: input open -> closed debug3: channel 0: will not send data after close debug1: channel 0: almost dead debug1: channel 0: gc: notify user debug1: channel 0: gc: user detached debug1: channel 0: send close debug1: channel 0: is dead debug1: channel 0: garbage collecting debug1: channel_free: channel 0: client-session, nchannels 1 debug3: channel_free: status: The following connections are open: #0 client-session (t4 r0 i3/0 o3/0 fd -1/-1) debug3: channel_close_fds: channel 0: r -1 w -1 e 7 debug1: fd 1 clearing O_NONBLOCK debug1: Transferred: stdin 0, stdout 0, stderr 0 bytes in 0.7 seconds debug1: Bytes per second: stdin 0.0, stdout 0.0, stderr 0.0 debug1: Exit status 0 ----------------------------ssh run from cron------------------- dev13: OpenSSH_3.4p1, SSH protocols 1.5/2.0, OpenSSL 0x0090603f debug1: Reading configuration data /etc/ssh_config debug1: Rhosts Authentication disabled, originating port will not be trusted. debug1: ssh_connect: needpriv 0 debug1: Connecting to dev13 [10.10.0.113] port 22. debug1: Connection established. debug1: identity file /home/glb/.ssh/identity type 0 debug1: identity file /home/glb/.ssh/id_rsa type -1 debug3: Not a RSA1 key file /home/glb/.ssh/id_dsa. debug2: key_type_from_name: unknown key type '-----BEGIN' debug3: key_read: no key found debug3: key_read: no space debug3: key_read: no space debug3: key_read: no space debug3: key_read: no space debug3: key_read: no space debug3: key_read: no space debug3: key_read: no space debug3: key_read: no space debug3: key_read: no space debug3: key_read: no space debug2: key_type_from_name: unknown key type '-----END' debug3: key_read: no key found debug1: identity file /home/glb/.ssh/id_dsa type 2 debug1: Remote protocol version 2.0, remote software version OpenSSH_3.4p1 debug1: match: OpenSSH_3.4p1 pat OpenSSH* Enabling compatibility mode for protocol 2.0 debug1: Local version string SSH-2.0-OpenSSH_3.4p1 debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 debug2: kex_parse_kexinit: ssh-rsa,ssh-dss debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc at lysator.liu.se debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc at lysator.liu.se debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: none debug2: kex_parse_kexinit: none debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: first_kex_follows 0 debug2: kex_parse_kexinit: reserved 0 debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 debug2: kex_parse_kexinit: ssh-dss debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc at lysator.liu.se debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc at lysator.liu.se debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: none,zlib debug2: kex_parse_kexinit: none,zlib debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: first_kex_follows 0 debug2: kex_parse_kexinit: reserved 0 debug2: mac_init: found hmac-md5 debug1: kex: server->client aes128-cbc hmac-md5 none debug2: mac_init: found hmac-md5 debug1: kex: client->server aes128-cbc hmac-md5 none debug1: SSH2_MSG_KEX_DH_GEX_REQUEST sent debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP debug1: dh_gen_key: priv key bits set: 112/256 debug1: bits set: 1545/3191 debug1: SSH2_MSG_KEX_DH_GEX_INIT sent debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY debug3: check_host_in_hostfile: filename /home/glb/.ssh/known_hosts debug3: check_host_in_hostfile: match line 1 debug3: check_host_in_hostfile: filename /home/glb/.ssh/known_hosts debug3: check_host_in_hostfile: match line 1 debug1: Host 'dev13' is known and matches the DSA host key. debug1: Found key in /home/glb/.ssh/known_hosts:1 debug1: bits set: 1540/3191 debug1: ssh_dss_verify: signature correct debug1: kex_derive_keys debug1: newkeys: mode 1 debug1: SSH2_MSG_NEWKEYS sent debug1: waiting for SSH2_MSG_NEWKEYS debug1: newkeys: mode 0 debug1: SSH2_MSG_NEWKEYS received debug1: done: ssh_kex2. debug1: send SSH2_MSG_SERVICE_REQUEST debug1: service_accept: ssh-userauth debug1: got SSH2_MSG_SERVICE_ACCEPT debug1: authentications that can continue: publickey,password,keyboard-interactive debug3: start over, passed a different list publickey,password,keyboard-interactive debug3: preferred publickey,keyboard-interactive,password debug3: authmethod_lookup publickey debug3: remaining preferred: keyboard-interactive,password debug3: authmethod_is_enabled publickey debug1: next auth method to try is publickey debug1: try privkey: /home/glb/.ssh/id_rsa debug3: no such identity: /home/glb/.ssh/id_rsa debug1: try pubkey: /home/glb/.ssh/id_dsa debug3: send_pubkey_test debug2: we sent a publickey packet, wait for reply debug1: input_userauth_pk_ok: pkalg ssh-dss blen 434 lastkey 0x81009f8 hint 2 debug2: input_userauth_pk_ok: fp 25:48:a7:14:e6:a0:b6:67:b2:b4:d6:a0:be:b3:98:8bdebug3: sign_and_send_pubkey debug1: read PEM private key done: type DSA debug1: ssh-userauth2 successful: method publickey debug1: fd 5 setting O_NONBLOCK debug1: fd 6 setting O_NONBLOCK debug1: fd 9 setting O_NONBLOCK debug1: channel 0: new [client-session] debug3: ssh_session2_open: channel_new: 0 debug1: send channel open 0 debug1: Entering interactive session. debug2: callback start debug1: ssh_session2_setup: id 0 debug1: Sending command: /bin/ls /usr/local/apache/logs/superstats/inserts | /usr/bin/wc -l;/bin/ls /home/glb/ready | /usr/bin/wc -l;/bin/ls /home/glb/stats | /usr/bin/wc -l debug1: channel request 0: exec debug2: callback done debug1: channel 0: open confirm rwindow 0 rmax 32768 debug2: channel 0: rcvd adjust 131072 debug1: channel 0: read<=0 rfd 5 len 0 debug1: channel 0: read failed debug1: channel 0: close_read debug1: channel 0: input open -> drain debug1: channel 0: ibuf empty debug1: channel 0: send eof debug1: channel 0: input drain -> closed debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: channel 0: rcvd eof debug1: channel 0: output open -> drain debug1: channel 0: rcvd close debug3: channel 0: will not send data after close killing pid 4473 debug1: channel_free: channel 0: client-session, nchannels 1 debug3: channel_free: status: The following connections are open: #0 client-session (t4 r0 i3/0 o1/8 fd -1/6) debug3: channel_close_fds: channel 0: r -1 w 6 e 9 debug1: fd 0 clearing O_NONBLOCK debug1: fd 1 clearing O_NONBLOCK debug1: fd 2 clearing O_NONBLOCK Killed by signal 15. debug1: Calling cleanup 0x8057a1c(0x0) debug1: Calling cleanup 0x8061a38(0x0) ----------- sshd (ssh commandline execution) ----------------- Aug 7 11:49:26 dev13 sshd[12279]: debug1: Forked child 12319. Aug 7 11:49:26 dev13 sshd[12319]: Connection from 10.10.0.114 port 2579 Aug 7 11:49:26 dev13 sshd[12319]: debug1: Client protocol version 2.0; client software version OpenSSH_3.4p1 Aug 7 11:49:26 dev13 sshd[12319]: debug1: match: OpenSSH_3.4p1 pat OpenSSH* Aug 7 11:49:26 dev13 sshd[12319]: Enabling compatibility mode for protocol 2.0 Aug 7 11:49:26 dev13 sshd[12319]: debug1: Local version string SSH-2.0-OpenSSH_3.4p1 Aug 7 11:49:26 dev13 sshd[12319]: debug2: Network child is on pid 12320 Aug 7 11:49:26 dev13 sshd[12319]: debug3: preauth child monitor started Aug 7 11:49:26 dev13 sshd[12319]: debug3: mm_request_receive entering Aug 7 11:49:26 dev13 sshd[12319]: debug3: monitor_read: checking request 0 Aug 7 11:49:26 dev13 sshd[12319]: debug3: mm_answer_moduli: got parameters: 1024 2048 8192 Aug 7 11:49:26 dev13 sshd[12319]: debug3: mm_request_send entering: type 1 Aug 7 11:49:26 dev13 sshd[12319]: debug2: monitor_read: 0 used once, disabling now Aug 7 11:49:26 dev13 sshd[12319]: debug3: mm_request_receive entering Aug 7 11:49:27 dev13 sshd[12319]: debug3: monitor_read: checking request 4 Aug 7 11:49:27 dev13 sshd[12319]: debug3: mm_answer_sign Aug 7 11:49:27 dev13 sshd[12319]: debug3: mm_answer_sign: signature 0x810e6b0(55) Aug 7 11:49:27 dev13 sshd[12319]: debug3: mm_request_send entering: type 5 Aug 7 11:49:27 dev13 sshd[12319]: debug2: monitor_read: 4 used once, disabling now Aug 7 11:49:27 dev13 sshd[12319]: debug3: mm_request_receive entering Aug 7 11:49:27 dev13 sshd[12319]: debug3: monitor_read: checking request 6 Aug 7 11:49:27 dev13 sshd[12319]: debug3: mm_answer_pwnamallow Aug 7 11:49:27 dev13 sshd[12319]: debug3: allowed_user: today 11906 sp_expire -1 sp_lstchg 11905 sp_max 99999 Aug 7 11:49:27 dev13 sshd[12319]: debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1 Aug 7 11:49:27 dev13 sshd[12319]: debug3: mm_request_send entering: type 7 Aug 7 11:49:27 dev13 sshd[12319]: debug2: monitor_read: 6 used once, disabling now Aug 7 11:49:27 dev13 sshd[12319]: debug3: mm_request_receive entering Aug 7 11:49:27 dev13 sshd[12319]: debug3: monitor_read: checking request 3 Aug 7 11:49:27 dev13 sshd[12319]: debug3: mm_answer_authserv: service=ssh-connection, styleAug 7 11:49:27 dev13 sshd[12319]: debug2: monitor_read: 3 used once, disabling now Aug 7 11:49:27 dev13 sshd[12319]: debug3: mm_request_receive entering Aug 7 11:49:27 dev13 sshd[12319]: debug3: monitor_read: checking request 10 Aug 7 11:49:27 dev13 sshd[12319]: debug3: mm_answer_authpassword: sending result 0 Aug 7 11:49:27 dev13 sshd[12319]: debug3: mm_request_send entering: type 11 Aug 7 11:49:27 dev13 sshd[12319]: Failed none for glb from 10.10.0.114 port 2579 ssh2 Aug 7 11:49:27 dev13 sshd[12319]: debug3: mm_request_receive entering Aug 7 11:49:27 dev13 sshd[12319]: debug3: monitor_read: checking request 20 Aug 7 11:49:27 dev13 sshd[12319]: debug3: mm_answer_keyallowed entering Aug 7 11:49:27 dev13 sshd[12319]: debug3: mm_answer_keyallowed: key_from_blob: 0x810e5b0 Aug 7 11:49:27 dev13 sshd[12319]: debug1: temporarily_use_uid: 522/522 (e=0) Aug 7 11:49:27 dev13 sshd[12319]: debug1: trying public key file /home/glb/.ssh/authorized_keys Aug 7 11:49:27 dev13 sshd[12319]: debug2: key_type_from_name: unknown key type '1024' Aug 7 11:49:27 dev13 sshd[12319]: debug3: key_read: no key found Aug 7 11:49:27 dev13 sshd[12319]: debug2: user_key_allowed: check options: '1024 35 128595740207060479507856105991669454865404461025581765915492788445768449910817035809257428743309483520830863871414048345249744622395099483967315161082950353293586719060363668584976439640719045510457757912702231439926431435993404972209707408336848979099754395967895610465708167435103384138084697297637267052747 glb at dev14.superstats.com ' Aug 7 11:49:27 dev13 sshd[12319]: debug2: key_type_from_name: unknown key type '35' Aug 7 11:49:27 dev13 sshd[12319]: debug3: key_read: no key found Aug 7 11:49:27 dev13 sshd[12319]: debug2: user_key_allowed: advance: '35 128595740207060479507856105991669454865404461025581765915492788445768449910817035809257428743309483520830863871414048345249744622395099483967315161082950353293586719060363668584976439640719045510457757912702231439926431435993404972209707408336848979099754395967895610465708167435103384138084697297637267052747 glb at dev14.superstats.com ' Aug 7 11:49:27 dev13 sshd[12319]: debug1: restore_uid Aug 7 11:49:27 dev13 sshd[12319]: debug2: key not found Aug 7 11:49:27 dev13 sshd[12319]: debug1: temporarily_use_uid: 522/522 (e=0) Aug 7 11:49:27 dev13 sshd[12319]: debug1: trying public key file /home/glb/.ssh/authorized_keys2 Aug 7 11:49:27 dev13 sshd[12319]: debug1: matching key found: file /home/glb/.ssh/authorized_keys2, line 2 Aug 7 11:49:27 dev13 sshd[12319]: Found matching DSA key: 25:48:a7:14:e6:a0:b6:67:b2:b4:d6:a0:be:b3:98:8b Aug 7 11:49:27 dev13 sshd[12319]: debug1: restore_uid Aug 7 11:49:27 dev13 sshd[12319]: debug3: mm_answer_keyallowed: key 0x810e5b0 is allowed Aug 7 11:49:27 dev13 sshd[12319]: debug3: mm_request_send entering: type 21 Aug 7 11:49:27 dev13 sshd[12319]: debug3: mm_request_receive entering Aug 7 11:49:27 dev13 sshd[12319]: debug3: monitor_read: checking request 20 Aug 7 11:49:27 dev13 sshd[12319]: debug3: mm_answer_keyallowed entering Aug 7 11:49:27 dev13 sshd[12319]: debug3: mm_answer_keyallowed: key_from_blob: 0x810e770 Aug 7 11:49:27 dev13 sshd[12319]: debug1: temporarily_use_uid: 522/522 (e=0) Aug 7 11:49:27 dev13 sshd[12319]: debug1: trying public key file /home/glb/.ssh/authorized_keys Aug 7 11:49:27 dev13 sshd[12319]: debug2: key_type_from_name: unknown key type '1024' Aug 7 11:49:27 dev13 sshd[12319]: debug3: key_read: no key found Aug 7 11:49:27 dev13 sshd[12319]: debug2: user_key_allowed: check options: '1024 35 128595740207060479507856105991669454865404461025581765915492788445768449910817035809257428743309483520830863871414048345249744622395099483967315161082950353293586719060363668584976439640719045510457757912702231439926431435993404972209707408336848979099754395967895610465708167435103384138084697297637267052747 glb at dev14.superstats.com ' Aug 7 11:49:27 dev13 sshd[12319]: debug2: key_type_from_name: unknown key type '35' Aug 7 11:49:27 dev13 sshd[12319]: debug3: key_read: no key found Aug 7 11:49:27 dev13 sshd[12319]: debug2: user_key_allowed: advance: '35 128595740207060479507856105991669454865404461025581765915492788445768449910817035809257428743309483520830863871414048345249744622395099483967315161082950353293586719060363668584976439640719045510457757912702231439926431435993404972209707408336848979099754395967895610465708167435103384138084697297637267052747 glb at dev14.superstats.com ' Aug 7 11:49:27 dev13 sshd[12319]: debug1: restore_uid Aug 7 11:49:27 dev13 sshd[12319]: debug2: key not found Aug 7 11:49:27 dev13 sshd[12319]: debug1: temporarily_use_uid: 522/522 (e=0) Aug 7 11:49:27 dev13 sshd[12319]: debug1: trying public key file /home/glb/.ssh/authorized_keys2 Aug 7 11:49:27 dev13 sshd[12319]: debug1: matching key found: file /home/glb/.ssh/authorized_keys2, line 2 Aug 7 11:49:27 dev13 sshd[12319]: Found matching DSA key: 25:48:a7:14:e6:a0:b6:67:b2:b4:d6:a0:be:b3:98:8b Aug 7 11:49:27 dev13 sshd[12319]: debug1: restore_uid Aug 7 11:49:27 dev13 sshd[12319]: debug3: mm_answer_keyallowed: key 0x810e770 is allowed Aug 7 11:49:27 dev13 sshd[12319]: debug3: mm_request_send entering: type 21 Aug 7 11:49:27 dev13 sshd[12319]: debug3: mm_request_receive entering Aug 7 11:49:27 dev13 sshd[12319]: debug3: monitor_read: checking request 22 Aug 7 11:49:27 dev13 sshd[12319]: debug1: ssh_dss_verify: signature correct Aug 7 11:49:27 dev13 sshd[12319]: debug3: mm_answer_keyverify: key 0x810e7a0 signature verified Aug 7 11:49:27 dev13 sshd[12319]: debug3: mm_request_send entering: type 23 Aug 7 11:49:27 dev13 sshd[12319]: Accepted publickey for glb from 10.10.0.114 port 2579 ssh2 Aug 7 11:49:27 dev13 sshd[12319]: debug1: monitor_child_preauth: glb has been authenticated by privileged process Aug 7 11:49:27 dev13 sshd[12319]: debug3: mm_get_keystate: Waiting for new keysAug 7 11:49:27 dev13 sshd[12319]: debug3: mm_request_receive_expect entering: type 24 Aug 7 11:49:27 dev13 sshd[12319]: debug3: mm_request_receive entering Aug 7 11:49:27 dev13 sshd[12319]: debug3: mm_newkeys_from_blob: 0x810ecf8(118) Aug 7 11:49:27 dev13 sshd[12319]: debug2: mac_init: found hmac-md5 Aug 7 11:49:27 dev13 sshd[12319]: debug3: mm_get_keystate: Waiting for second key Aug 7 11:49:27 dev13 sshd[12319]: debug3: mm_newkeys_from_blob: 0x810ecf8(118) Aug 7 11:49:28 dev13 sshd[12319]: debug2: mac_init: found hmac-md5 Aug 7 11:49:28 dev13 sshd[12319]: debug3: mm_get_keystate: Getting compression state Aug 7 11:49:28 dev13 sshd[12319]: debug3: mm_get_keystate: Getting Network I/O buffers Aug 7 11:49:28 dev13 sshd[12319]: debug3: mm_share_sync: Share sync Aug 7 11:49:28 dev13 sshd[12319]: debug3: mm_share_sync: Share sync end Aug 7 11:49:28 dev13 sshd[12319]: debug2: User child is on pid 12321 Aug 7 11:49:28 dev13 sshd[12321]: debug1: newkeys: mode 0 Aug 7 11:49:28 dev13 sshd[12319]: debug3: mm_request_receive entering Aug 7 11:49:28 dev13 sshd[12321]: debug1: newkeys: mode 1 Aug 7 11:49:28 dev13 sshd[12321]: debug1: Entering interactive session for SSH2. Aug 7 11:49:28 dev13 sshd[12321]: debug1: fd 5 setting O_NONBLOCK Aug 7 11:49:28 dev13 sshd[12321]: debug1: fd 6 setting O_NONBLOCK Aug 7 11:49:28 dev13 sshd[12321]: debug1: server_init_dispatch_20 Aug 7 11:49:28 dev13 sshd[12321]: debug1: server_input_channel_open: ctype session rchan 0 win 131072 max 32768 Aug 7 11:49:28 dev13 sshd[12321]: debug1: input_session_request Aug 7 11:49:28 dev13 sshd[12321]: debug1: channel 0: new [server-session] Aug 7 11:49:28 dev13 sshd[12321]: debug1: session_new: init Aug 7 11:49:28 dev13 sshd[12321]: debug1: session_new: session 0 Aug 7 11:49:28 dev13 sshd[12321]: debug1: session_open: channel 0 Aug 7 11:49:28 dev13 sshd[12321]: debug1: session_open: session 0: link with channel 0 Aug 7 11:49:28 dev13 sshd[12321]: debug1: server_input_channel_open: confirm session Aug 7 11:49:28 dev13 sshd[12321]: debug1: server_input_channel_req: channel 0 request exec reply 0 Aug 7 11:49:28 dev13 sshd[12321]: debug1: session_by_channel: session 0 channel 0 Aug 7 11:49:28 dev13 sshd[12321]: debug1: session_input_channel_req: session 0 req exec Aug 7 11:49:28 dev13 sshd[12321]: debug1: fd 8 setting O_NONBLOCK Aug 7 11:49:28 dev13 sshd[12322]: debug3: channel_close_fds: channel 0: r -1 w -1 e -1 Aug 7 11:49:28 dev13 sshd[12321]: debug2: fd 8 is O_NONBLOCK Aug 7 11:49:28 dev13 sshd[12321]: debug1: fd 10 setting O_NONBLOCK Aug 7 11:49:28 dev13 sshd[12321]: debug1: Received SIGCHLD. Aug 7 11:49:28 dev13 sshd[12321]: debug1: session_by_pid: pid 12322 Aug 7 11:49:28 dev13 sshd[12321]: debug1: session_exit_message: session 0 channel 0 pid 12322 Aug 7 11:49:28 dev13 sshd[12321]: debug1: channel request 0: exit-status Aug 7 11:49:28 dev13 sshd[12321]: debug1: session_exit_message: release channel 0 Aug 7 11:49:28 dev13 sshd[12321]: debug1: channel 0: write failed Aug 7 11:49:28 dev13 sshd[12321]: debug1: channel 0: close_write Aug 7 11:49:28 dev13 sshd[12321]: debug1: channel 0: output open -> closed Aug 7 11:49:28 dev13 sshd[12321]: debug1: session_close: session 0 pid 12322 Aug 7 11:49:28 dev13 sshd[12321]: debug1: channel 0: read<=0 rfd 8 len 0 Aug 7 11:49:28 dev13 sshd[12321]: debug1: channel 0: read failed Aug 7 11:49:28 dev13 sshd[12321]: debug1: channel 0: close_read Aug 7 11:49:28 dev13 sshd[12321]: debug1: channel 0: input open -> drain Aug 7 11:49:28 dev13 sshd[12321]: debug2: channel 0: read 0 from efd 10 Aug 7 11:49:28 dev13 sshd[12321]: debug2: channel 0: closing read-efd 10 Aug 7 11:49:28 dev13 sshd[12321]: debug1: channel 0: ibuf empty Aug 7 11:49:28 dev13 sshd[12321]: debug1: channel 0: send eof Aug 7 11:49:28 dev13 sshd[12321]: debug1: channel 0: input drain -> closed Aug 7 11:49:28 dev13 sshd[12321]: debug1: channel 0: send close Aug 7 11:49:28 dev13 sshd[12321]: debug2: notify_done: reading Aug 7 11:49:28 dev13 sshd[12321]: debug3: channel 0: will not send data after close Aug 7 11:49:28 dev13 sshd[12321]: debug1: channel 0: rcvd close Aug 7 11:49:28 dev13 sshd[12321]: debug3: channel 0: will not send data after close Aug 7 11:49:28 dev13 sshd[12321]: debug1: channel 0: is dead Aug 7 11:49:28 dev13 sshd[12321]: debug1: channel 0: garbage collecting Aug 7 11:49:28 dev13 sshd[12321]: debug1: channel_free: channel 0: server-session, nchannels 1 Aug 7 11:49:28 dev13 sshd[12321]: debug3: channel_free: status: The following connections are open:^M #0 server-session (t4 r0 i3/0 o3/0 fd 8/8)^M Aug 7 11:49:28 dev13 sshd[12321]: debug3: channel_close_fds: channel 0: r 8 w 8 e -1 Aug 7 11:49:28 dev13 sshd[12321]: Connection closed by remote host. Aug 7 11:49:28 dev13 sshd[12321]: Closing connection to 10.10.0.114 Aug 7 11:49:28 dev13 sshd[12321]: debug3: mm_request_send entering: type 38 Aug 7 11:49:28 dev13 sshd[12319]: debug3: monitor_read: checking request 38 Aug 7 11:49:28 dev13 sshd[12319]: debug3: mm_answer_term: tearing down sessions --------------------sshd (ssh cron executed)---------------------- Aug 7 11:49:56 dev13 sshd[12279]: debug1: Forked child 12329. Aug 7 11:49:56 dev13 sshd[12329]: Connection from 10.10.0.114 port 2581 Aug 7 11:49:56 dev13 sshd[12329]: debug1: Client protocol version 2.0; client software version OpenSSH_3.4p1 Aug 7 11:49:56 dev13 sshd[12329]: debug1: match: OpenSSH_3.4p1 pat OpenSSH* Aug 7 11:49:56 dev13 sshd[12329]: Enabling compatibility mode for protocol 2.0 Aug 7 11:49:56 dev13 sshd[12329]: debug1: Local version string SSH-2.0-OpenSSH_3.4p1 Aug 7 11:49:56 dev13 sshd[12329]: debug2: Network child is on pid 12330 Aug 7 11:49:56 dev13 sshd[12329]: debug3: preauth child monitor started Aug 7 11:49:56 dev13 sshd[12329]: debug3: mm_request_receive entering Aug 7 11:49:56 dev13 sshd[12329]: debug3: monitor_read: checking request 0 Aug 7 11:49:56 dev13 sshd[12329]: debug3: mm_answer_moduli: got parameters: 1024 2048 8192 Aug 7 11:49:56 dev13 sshd[12329]: debug3: mm_request_send entering: type 1 Aug 7 11:49:56 dev13 sshd[12329]: debug2: monitor_read: 0 used once, disabling now Aug 7 11:49:56 dev13 sshd[12329]: debug3: mm_request_receive entering Aug 7 11:49:57 dev13 sshd[12329]: debug3: monitor_read: checking request 4 Aug 7 11:49:57 dev13 sshd[12329]: debug3: mm_answer_sign Aug 7 11:49:57 dev13 sshd[12329]: debug3: mm_answer_sign: signature 0x810e6b0(55) Aug 7 11:49:57 dev13 sshd[12329]: debug3: mm_request_send entering: type 5 Aug 7 11:49:57 dev13 sshd[12329]: debug2: monitor_read: 4 used once, disabling now Aug 7 11:49:57 dev13 sshd[12329]: debug3: mm_request_receive entering Aug 7 11:49:57 dev13 sshd[12329]: debug3: monitor_read: checking request 6 Aug 7 11:49:57 dev13 sshd[12329]: debug3: mm_answer_pwnamallow Aug 7 11:49:57 dev13 sshd[12329]: debug3: allowed_user: today 11906 sp_expire -1 sp_lstchg 11905 sp_max 99999 Aug 7 11:49:57 dev13 sshd[12329]: debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1 Aug 7 11:49:57 dev13 sshd[12329]: debug3: mm_request_send entering: type 7 Aug 7 11:49:57 dev13 sshd[12329]: debug2: monitor_read: 6 used once, disabling now Aug 7 11:49:57 dev13 sshd[12329]: debug3: mm_request_receive entering Aug 7 11:49:57 dev13 sshd[12329]: debug3: monitor_read: checking request 3 Aug 7 11:49:57 dev13 sshd[12329]: debug3: mm_answer_authserv: service=ssh-connection, styleAug 7 11:49:57 dev13 sshd[12329]: debug2: monitor_read: 3 used once, disabling now Aug 7 11:49:57 dev13 sshd[12329]: debug3: mm_request_receive entering Aug 7 11:49:57 dev13 sshd[12329]: debug3: monitor_read: checking request 10 Aug 7 11:49:57 dev13 sshd[12329]: debug3: mm_answer_authpassword: sending result 0 Aug 7 11:49:57 dev13 sshd[12329]: debug3: mm_request_send entering: type 11 Aug 7 11:49:57 dev13 sshd[12329]: Failed none for glb from 10.10.0.114 port 2581 ssh2 Aug 7 11:49:57 dev13 sshd[12329]: debug3: mm_request_receive entering Aug 7 11:49:57 dev13 sshd[12329]: debug3: monitor_read: checking request 20 Aug 7 11:49:57 dev13 sshd[12329]: debug3: mm_answer_keyallowed entering Aug 7 11:49:57 dev13 sshd[12329]: debug3: mm_answer_keyallowed: key_from_blob: 0x810e5b0 Aug 7 11:49:57 dev13 sshd[12329]: debug1: temporarily_use_uid: 522/522 (e=0) Aug 7 11:49:57 dev13 sshd[12329]: debug1: trying public key file /home/glb/.ssh/authorized_keys Aug 7 11:49:57 dev13 sshd[12329]: debug2: key_type_from_name: unknown key type '1024' Aug 7 11:49:57 dev13 sshd[12329]: debug3: key_read: no key found Aug 7 11:49:57 dev13 sshd[12329]: debug2: user_key_allowed: check options: '1024 35 128595740207060479507856105991669454865404461025581765915492788445768449910817035809257428743309483520830863871414048345249744622395099483967315161082950353293586719060363668584976439640719045510457757912702231439926431435993404972209707408336848979099754395967895610465708167435103384138084697297637267052747 glb at dev14.superstats.com ' Aug 7 11:49:57 dev13 sshd[12329]: debug2: key_type_from_name: unknown key type '35' Aug 7 11:49:57 dev13 sshd[12329]: debug3: key_read: no key found Aug 7 11:49:57 dev13 sshd[12329]: debug2: user_key_allowed: advance: '35 128595740207060479507856105991669454865404461025581765915492788445768449910817035809257428743309483520830863871414048345249744622395099483967315161082950353293586719060363668584976439640719045510457757912702231439926431435993404972209707408336848979099754395967895610465708167435103384138084697297637267052747 glb at dev14.superstats.com ' Aug 7 11:49:57 dev13 sshd[12329]: debug1: restore_uid Aug 7 11:49:57 dev13 sshd[12329]: debug2: key not found Aug 7 11:49:57 dev13 sshd[12329]: debug1: temporarily_use_uid: 522/522 (e=0) Aug 7 11:49:57 dev13 sshd[12329]: debug1: trying public key file /home/glb/.ssh/authorized_keys2 Aug 7 11:49:57 dev13 sshd[12329]: debug1: matching key found: file /home/glb/.ssh/authorized_keys2, line 2 Aug 7 11:49:57 dev13 sshd[12329]: Found matching DSA key: 25:48:a7:14:e6:a0:b6:67:b2:b4:d6:a0:be:b3:98:8b Aug 7 11:49:57 dev13 sshd[12329]: debug1: restore_uid Aug 7 11:49:57 dev13 sshd[12329]: debug3: mm_answer_keyallowed: key 0x810e5b0 is allowed Aug 7 11:49:57 dev13 sshd[12329]: debug3: mm_request_send entering: type 21 Aug 7 11:49:57 dev13 sshd[12329]: debug3: mm_request_receive entering Aug 7 11:49:57 dev13 sshd[12329]: debug3: monitor_read: checking request 20 Aug 7 11:49:57 dev13 sshd[12329]: debug3: mm_answer_keyallowed entering Aug 7 11:49:57 dev13 sshd[12329]: debug3: mm_answer_keyallowed: key_from_blob: 0x810e770 Aug 7 11:49:57 dev13 sshd[12329]: debug1: temporarily_use_uid: 522/522 (e=0) Aug 7 11:49:57 dev13 sshd[12329]: debug1: trying public key file /home/glb/.ssh/authorized_keys Aug 7 11:49:57 dev13 sshd[12329]: debug2: key_type_from_name: unknown key type '1024' Aug 7 11:49:57 dev13 sshd[12329]: debug3: key_read: no key found Aug 7 11:49:57 dev13 sshd[12329]: debug2: user_key_allowed: check options: '1024 35 128595740207060479507856105991669454865404461025581765915492788445768449910817035809257428743309483520830863871414048345249744622395099483967315161082950353293586719060363668584976439640719045510457757912702231439926431435993404972209707408336848979099754395967895610465708167435103384138084697297637267052747 glb at dev14.superstats.com ' Aug 7 11:49:57 dev13 sshd[12329]: debug2: key_type_from_name: unknown key type '35' Aug 7 11:49:57 dev13 sshd[12329]: debug3: key_read: no key found Aug 7 11:49:57 dev13 sshd[12329]: debug2: user_key_allowed: advance: '35 128595740207060479507856105991669454865404461025581765915492788445768449910817035809257428743309483520830863871414048345249744622395099483967315161082950353293586719060363668584976439640719045510457757912702231439926431435993404972209707408336848979099754395967895610465708167435103384138084697297637267052747 glb at dev14.superstats.com ' Aug 7 11:49:57 dev13 sshd[12329]: debug1: restore_uid Aug 7 11:49:57 dev13 sshd[12329]: debug2: key not found Aug 7 11:49:57 dev13 sshd[12329]: debug1: temporarily_use_uid: 522/522 (e=0) Aug 7 11:49:57 dev13 sshd[12329]: debug1: trying public key file /home/glb/.ssh/authorized_keys2 Aug 7 11:49:57 dev13 sshd[12329]: debug1: matching key found: file /home/glb/.ssh/authorized_keys2, line 2 Aug 7 11:49:57 dev13 sshd[12329]: Found matching DSA key: 25:48:a7:14:e6:a0:b6:67:b2:b4:d6:a0:be:b3:98:8b Aug 7 11:49:57 dev13 sshd[12329]: debug1: restore_uid Aug 7 11:49:57 dev13 sshd[12329]: debug3: mm_answer_keyallowed: key 0x810e770 is allowed Aug 7 11:49:57 dev13 sshd[12329]: debug3: mm_request_send entering: type 21 Aug 7 11:49:57 dev13 sshd[12329]: debug3: mm_request_receive entering Aug 7 11:49:57 dev13 sshd[12329]: debug3: monitor_read: checking request 22 Aug 7 11:49:57 dev13 sshd[12329]: debug1: ssh_dss_verify: signature correct Aug 7 11:49:57 dev13 sshd[12329]: debug3: mm_answer_keyverify: key 0x810e7a0 signature verified Aug 7 11:49:57 dev13 sshd[12329]: debug3: mm_request_send entering: type 23 Aug 7 11:49:57 dev13 sshd[12329]: Accepted publickey for glb from 10.10.0.114 port 2581 ssh2 Aug 7 11:49:57 dev13 sshd[12329]: debug1: monitor_child_preauth: glb has been authenticated by privileged process Aug 7 11:49:57 dev13 sshd[12329]: debug3: mm_get_keystate: Waiting for new keysAug 7 11:49:57 dev13 sshd[12329]: debug3: mm_request_receive_expect entering: type 24 Aug 7 11:49:57 dev13 sshd[12329]: debug3: mm_request_receive entering Aug 7 11:49:57 dev13 sshd[12329]: debug3: mm_newkeys_from_blob: 0x810ecf8(118) Aug 7 11:49:57 dev13 sshd[12329]: debug2: mac_init: found hmac-md5 Aug 7 11:49:57 dev13 sshd[12329]: debug3: mm_get_keystate: Waiting for second key Aug 7 11:49:57 dev13 sshd[12329]: debug3: mm_newkeys_from_blob: 0x810ecf8(118) Aug 7 11:49:57 dev13 sshd[12329]: debug2: mac_init: found hmac-md5 Aug 7 11:49:57 dev13 sshd[12329]: debug3: mm_get_keystate: Getting compression state Aug 7 11:49:57 dev13 sshd[12329]: debug3: mm_get_keystate: Getting Network I/O buffers Aug 7 11:49:57 dev13 sshd[12329]: debug3: mm_share_sync: Share sync Aug 7 11:49:57 dev13 sshd[12329]: debug3: mm_share_sync: Share sync end Aug 7 11:49:57 dev13 sshd[12329]: debug2: User child is on pid 12331 Aug 7 11:49:57 dev13 sshd[12331]: debug1: newkeys: mode 0 Aug 7 11:49:57 dev13 sshd[12329]: debug3: mm_request_receive entering Aug 7 11:49:57 dev13 sshd[12331]: debug1: newkeys: mode 1 Aug 7 11:49:58 dev13 sshd[12331]: debug1: Entering interactive session for SSH2. Aug 7 11:49:58 dev13 sshd[12331]: debug1: fd 5 setting O_NONBLOCK Aug 7 11:49:58 dev13 sshd[12331]: debug1: fd 6 setting O_NONBLOCK Aug 7 11:49:58 dev13 sshd[12331]: debug1: server_init_dispatch_20 Aug 7 11:49:58 dev13 sshd[12331]: debug1: server_input_channel_open: ctype session rchan 0 win 131072 max 32768 Aug 7 11:49:58 dev13 sshd[12331]: debug1: input_session_request Aug 7 11:49:58 dev13 sshd[12331]: debug1: channel 0: new [server-session] Aug 7 11:49:58 dev13 sshd[12331]: debug1: session_new: init Aug 7 11:49:58 dev13 sshd[12331]: debug1: session_new: session 0 Aug 7 11:49:58 dev13 sshd[12331]: debug1: session_open: channel 0 Aug 7 11:49:58 dev13 sshd[12331]: debug1: session_open: session 0: link with channel 0 Aug 7 11:49:58 dev13 sshd[12331]: debug1: server_input_channel_open: confirm session Aug 7 11:49:58 dev13 sshd[12331]: debug1: server_input_channel_req: channel 0 request exec reply 0 Aug 7 11:49:58 dev13 sshd[12331]: debug1: session_by_channel: session 0 channel 0 Aug 7 11:49:58 dev13 sshd[12331]: debug1: session_input_channel_req: session 0 req exec Aug 7 11:49:58 dev13 sshd[12331]: debug1: fd 8 setting O_NONBLOCK Aug 7 11:49:58 dev13 sshd[12332]: debug3: channel_close_fds: channel 0: r -1 w -1 e -1 Aug 7 11:49:58 dev13 sshd[12331]: debug2: fd 8 is O_NONBLOCK Aug 7 11:49:58 dev13 sshd[12331]: debug1: fd 10 setting O_NONBLOCK Aug 7 11:49:58 dev13 sshd[12331]: debug1: Received SIGCHLD. Aug 7 11:49:58 dev13 sshd[12331]: debug1: channel 0: output open -> drain Aug 7 11:49:58 dev13 sshd[12331]: debug1: channel 0: obuf empty Aug 7 11:49:58 dev13 sshd[12331]: debug1: channel 0: close_write Aug 7 11:49:58 dev13 sshd[12331]: debug1: channel 0: output drain -> closed Aug 7 11:49:58 dev13 sshd[12331]: debug2: notify_done: reading Aug 7 11:49:58 dev13 sshd[12331]: debug1: session_by_pid: pid 12332 Aug 7 11:49:58 dev13 sshd[12331]: debug1: session_exit_message: session 0 channel 0 pid 12332 Aug 7 11:49:58 dev13 sshd[12331]: debug1: channel request 0: exit-status Aug 7 11:49:58 dev13 sshd[12331]: debug1: session_exit_message: release channel 0 Aug 7 11:49:58 dev13 sshd[12331]: debug1: session_close: session 0 pid 12332 Aug 7 11:49:58 dev13 sshd[12331]: debug2: channel 0: read 0 from efd 10 Aug 7 11:49:58 dev13 sshd[12331]: debug2: channel 0: closing read-efd 10 Aug 7 11:49:58 dev13 sshd[12331]: debug1: channel 0: read<=0 rfd 8 len 0 Aug 7 11:49:58 dev13 sshd[12331]: debug1: channel 0: read failed Aug 7 11:49:58 dev13 sshd[12331]: debug1: channel 0: close_read Aug 7 11:49:58 dev13 sshd[12331]: debug1: channel 0: input open -> drain Aug 7 11:49:58 dev13 sshd[12331]: debug1: channel 0: ibuf empty Aug 7 11:49:58 dev13 sshd[12331]: debug1: channel 0: send eof Aug 7 11:49:58 dev13 sshd[12331]: debug1: channel 0: input drain -> closed Aug 7 11:49:58 dev13 sshd[12331]: debug1: channel 0: send close Aug 7 11:49:58 dev13 sshd[12331]: debug3: channel 0: will not send data after close Aug 7 11:50:18 dev13 last message repeated 198 times Aug 7 11:50:18 dev13 sshd[12331]: Connection closed by remote host. Aug 7 11:50:18 dev13 sshd[12331]: debug1: channel_free: channel 0: server-session, nchannels 1 Aug 7 11:50:18 dev13 sshd[12331]: debug3: channel_free: status: The following connections are open:^M #0 server-session (t4 r0 i3/0 o3/0 fd 8/8)^M Aug 7 11:50:18 dev13 sshd[12331]: debug3: channel_close_fds: channel 0: r 8 w 8 e -1 Aug 7 11:50:18 dev13 sshd[12331]: Closing connection to 10.10.0.114 Aug 7 11:50:18 dev13 sshd[12331]: debug3: mm_request_send entering: type 38 Aug 7 11:50:18 dev13 sshd[12329]: debug3: monitor_read: checking request 38 Aug 7 11:50:18 dev13 sshd[12329]: debug3: mm_answer_term: tearing down sessions On Wed, 2002-08-07 at 11:17, Nicolas.Williams at ubsw.com wrote:> > "ssh -n ..." means ssh will close stdin and open /dev/null for stdin. It does not mean losing th eoutput of ssh. > > Nico > -- >