bugzilla-daemon at mindrot.org
2003-Feb-24 22:16 UTC
[Bug 502] New: sshd fails when "Compression yes" set on HPUX
http://bugzilla.mindrot.org/show_bug.cgi?id=502 Summary: sshd fails when "Compression yes" set on HPUX Product: Portable OpenSSH Version: 3.5p1 Platform: HPPA OS/Version: HP-UX Status: NEW Severity: normal Priority: P2 Component: sshd AssignedTo: openssh-unix-dev at mindrot.org ReportedBy: dbrownell at dynix.com sshd fails each time when I set "Compression yes" in /usr/local/etc/sshd_config on an HPUX 10.20. OpenSSH version is OpenSSH_3.5p1 zlib version is 1.1.4 OpenSSL version is OpenSSL 0.9.6g 9 Aug 2002 The compiler is the HP C/ANSI C B.10.20.03 syslog on the sshd systems reports: Feb 24 12:46:32 als3 sshd[15645]: fatal: buffer_append_space: alloc 10506240 not supported I've tried recompiling zlib and openssh with different options to no effect. sshd -ddd shows: debug3: Seeding PRNG from /usr/local/libexec/ssh-rand-helper debug1: sshd version OpenSSH_3.5p1 debug1: private host key: #0 type 0 RSA1 debug3: Not a RSA1 key file /usr/local/etc/ssh_host_rsa_key. debug1: read PEM private key done: type RSA debug1: private host key: #1 type 1 RSA debug3: Not a RSA1 key file /usr/local/etc/ssh_host_dsa_key. debug1: read PEM private key done: type DSA debug1: private host key: #2 type 2 DSA debug1: Bind to port 22 on 0.0.0.0. Server listening on 0.0.0.0 port 22. Generating 768 bit RSA key. RSA key generation complete. debug1: Server will not fork when running in debugging mode. Connection from 12.168.109.200 port 35213 debug1: Client protocol version 2.0; client software version OpenSSH_3.4p1 debug1: match: OpenSSH_3.4p1 pat OpenSSH* debug1: Enabling compatibility mode for protocol 2.0 debug1: Local version string SSH-1.99-OpenSSH_3.5p1 debug2: Network child is on pid 22200 debug3: preauth child monitor started debug3: entering debug3: privsep user:group 74:74 debug1: permanently_set_uid: 74/74 debug1: list_hostkey_types: ssh-rsa,ssh-dss debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 debug2: kex_parse_kexinit: ssh-rsa,ssh-dss debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc at lysator.liu.se debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc at lysator.liu.se debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: none,zlib debug2: kex_parse_kexinit: none,zlib debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: first_kex_follows 0 debug2: kex_parse_kexinit: reserved 0 debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 debug2: kex_parse_kexinit: ssh-rsa,ssh-dss debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc at lysator.liu.se debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc at lysator.liu.se debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: zlib debug2: kex_parse_kexinit: zlib debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: first_kex_follows 0 debug2: kex_parse_kexinit: reserved 0 debug2: mac_init: found hmac-md5 debug1: kex: client->server aes128-cbc hmac-md5 zlib debug2: mac_init: found hmac-md5 debug1: kex: server->client aes128-cbc hmac-md5 zlib debug1: SSH2_MSG_KEX_DH_GEX_REQUEST received debug3: entering: type 0 debug3: : waiting for MONITOR_ANS_MODULI debug3: : checking request 0debug3: entering: type 1 debug3: entering debug3: : got parameters: 1024 2048 8192 debug3: entering: type 1 debug2: : 0 used once, disabling now debug3: : remaining 0 debug3: entering debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent debug1: dh_gen_key: priv key bits set: 128/256 debug1: bits set: 1575/3191 debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT debug1: bits set: 1553/3191 debug3: entering debug3: entering: type 4 debug3: : waiting for MONITOR_ANS_SIGN debug3: entering: type 5 debug3: entering debug3: : checking request 4 debug3: debug3: : signature 4002f878(143) debug3: entering: type 5 debug2: : 4 used once, disabling now debug1: SSH2_MSG_KEX_DH_GEX_REPLY sentdebug3: entering debug1: kex_derive_keys debug1: newkeys: mode 1 debug1: Enabling compression at level 6. debug1: SSH2_MSG_NEWKEYS sent debug1: waiting for SSH2_MSG_NEWKEYS debug1: newkeys: mode 0 debug1: SSH2_MSG_NEWKEYS received debug1: KEX done debug1: userauth-request for user root service ssh-connection method none debug1: attempt 0 failures 0 debug3: entering debug3: entering: type 6 debug3: : waiting for MONITOR_ANS_PWNAM debug3: : checking request 6debug3: entering: type 7 debug3: entering debug3: debug3: : sending MONITOR_ANS_PWNAM: 1 debug3: entering: type 7 debug2: : 6 used once, disabling nowdebug2: input_userauth_request: setting up authctxt for root debug3: entering debug3: entering debug3: entering: type 3 debug2: input_userauth_request: try method nonedebug3: : checking request 3 debug3: : service=ssh-connection, styledebug3: entering debug2: : 3 used once, disabling now debug3: entering: type 10 debug3: entering debug3: : waiting for MONITOR_ANS_AUTHPASSWORD debug3: entering: type 11 debug3: : checking request 10 debug3: enteringdebug3: : sending result 0 debug3: entering: type 11 debug3: : user not authenticatedFailed none for root from 12.168.109.200 port 35213 ssh2 debug3: entering Failed none for root from 12.168.109.200 port 35213 ssh2 debug1: userauth-request for user root service ssh-connection method publickey debug1: attempt 1 failures 1 debug2: input_userauth_request: try method publickey debug1: test whether pkalg/pkblob are acceptable debug3: entering debug3: entering: type 20 debug3: : waiting for MONITOR_ANS_KEYALLOWED debug3: : checking request 20debug3: entering: type 21 debug3: entering debug3: entering debug3: : key_from_blob: 4002f8a0 debug1: temporarily_use_uid: 0/3 (e=0/3) debug1: trying public key file //.ssh/authorized_keys debug1: restore_uid: 0/3 debug1: temporarily_use_uid: 0/3 (e=0/3) debug1: trying public key file //.ssh/authorized_keys2 debug3: secure_filename: checking '/.ssh' debug3: secure_filename: checking '/' debug3: secure_filename: terminating check at '/' debug1: matching key found: file //.ssh/authorized_keys2, line 1 Found matching DSA key: be:ca:c4:c5:ad:b3:4a:7c:42:c1:2d:3e:7e:30:91:e5 debug1: restore_uid: 0/3 debug3: : key 4002f8a0 is allowed debug3: entering: type 21 debug3: entering debug2: userauth_pubkey: authenticated 0 pkalg ssh-dss Postponed publickey for root from 12.168.109.200 port 35213 ssh2 debug1: userauth-request for user root service ssh-connection method publickey debug1: attempt 2 failures 1 debug2: input_userauth_request: try method publickey debug3: entering debug3: entering: type 20 debug3: : waiting for MONITOR_ANS_KEYALLOWED debug3: entering: type 21 debug3: : checking request 20debug3: entering debug3: entering debug3: : key_from_blob: 4002f8c0 debug1: temporarily_use_uid: 0/3 (e=0/3) debug1: trying public key file //.ssh/authorized_keys debug1: restore_uid: 0/3 debug1: temporarily_use_uid: 0/3 (e=0/3) debug1: trying public key file //.ssh/authorized_keys2 debug3: secure_filename: checking '/.ssh' debug3: secure_filename: checking '/' debug3: secure_filename: terminating check at '/' debug1: matching key found: file //.ssh/authorized_keys2, line 1 Found matching DSA key: be:ca:c4:c5:ad:b3:4a:7c:42:c1:2d:3e:7e:30:91:e5 debug1: restore_uid: 0/3 debug3: : key 4002f8c0 is allowed debug3: entering: type 21 debug3: entering debug3: entering debug3: entering: type 22 debug3: : waiting for MONITOR_ANS_KEYVERIFY debug3: : checking request 22debug3: entering: type 23 debug3: entering debug1: ssh_dss_verify: signature correct debug3: : key 4002f8f0 signature verified debug3: entering: type 23 debug2: userauth_pubkey: authenticated 1 pkalg ssh-dss Accepted publickey for root from 12.168.109.200 port 35213 ssh2 debug3: : Sending new keys: 40030e08 40030d88 debug3: : converting 40030e08 debug3: : converting 40030d88 debug3: : New keys have been sent debug3: : Sending compression state debug3: entering: type 24 debug3: : Finished sending state Accepted publickey for root from 12.168.109.200 port 35213 ssh2 debug1: : root has been authenticated by privileged process debug3: : Waiting for new keys debug3: entering: type 24 debug3: entering debug3: : 4002fba0(118) debug2: mac_init: found hmac-md5 debug3: : Waiting for second key debug3: : 4002fba0(118) debug2: mac_init: found hmac-md5 debug3: : Getting compression state debug3: : Getting Network I/O buffers debug3: : Share sync debug3: : Share sync end debug1: newkeys: mode 0 debug1: newkeys: mode 1 debug1: Entering interactive session for SSH2. debug1: fd 3 setting O_NONBLOCK debug1: fd 7 setting O_NONBLOCK debug1: server_init_dispatch_20 buffer_append_space: alloc 10506240 not supported debug1: Calling cleanup 0x4001f72a(0x0) David Brownell ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
Mark Janssen
2003-Feb-24 23:59 UTC
[Bug 502] New: sshd fails when "Compression yes" set on HPUX
On Mon, 2003-02-24 at 23:16, bugzilla-daemon at mindrot.org wrote:> http://bugzilla.mindrot.org/show_bug.cgi?id=502 > > Summary: sshd fails when "Compression yes" set on HPUX[snip]> debug1: newkeys: mode 1 > debug1: Entering interactive session for SSH2. > debug1: fd 3 setting O_NONBLOCK > debug1: fd 7 setting O_NONBLOCK > debug1: server_init_dispatch_20 > buffer_append_space: alloc 10506240 not supported > debug1: Calling cleanup 0x4001f72a(0x0)Try getting a new zlib and recompiling openssh against that... that worked for me with this error. -- Mark Janssen -- maniac(at)maniac.nl -- GnuPG Key Id: 357D2178 Unix / Linux, Open-Source and Internet Consultant @ SyConOS IT Maniac.nl Unix-God.Net|Org MarkJanssen.org|nl SyConOS.com|nl