Hi, I've seen a few messages re. problems with 3.7.1p1 on IRIX 6.5... I'm using 6.5.19 and having no trouble compiling, installing and starting, but sshd just closes the connection with no explanation. debug/verbose modes don't seem to give any clues. Darren Tucker suggested defining BROKEN_GETADDRINFO in config.h, but I find that compilation then fails (assuming I've implemented this right). Has anyone had any success yet? Thanks. --- Victoria Pennington Manchester Computing, Kilburn Building, University of Manchester, Oxford Road, Manchester M13 9PL tel. 0161 275 6830, email: v.pennington at man.ac.uk
On Wed, Sep 17, 2003 at 01:59:46PM +0100, Victoria Pennington wrote:> I've seen a few messages re. problems with 3.7.1p1 on IRIX 6.5... > I'm using 6.5.19 and having no trouble compiling, installing and > starting, but sshd just closes the connection with no explanation. > debug/verbose modes don't seem to give any clues. > > Darren Tucker suggested defining BROKEN_GETADDRINFO in config.h, > but I find that compilation then fails (assuming I've implemented this > right). > > Has anyone had any success yet?I use the following patch for IRIX. Rerun autoconf and autoheader. -- albert chin (china at thewrittenword.com) -- snip snip --- configure.ac.orig Tue Sep 16 09:39:55 2003 +++ configure.ac Wed Sep 17 09:22:03 2003 @@ -198,6 +178,10 @@ AC_DEFINE(WITH_IRIX_AUDIT) AC_CHECK_FUNC(jlimit_startjob, [AC_DEFINE(WITH_IRIX_JOBS)]) AC_DEFINE(BROKEN_INET_NTOA) + AC_DEFINE(BROKEN_GETADDRINFO) + AC_DEFINE(SETEUID_BREAKS_SETUID) + AC_DEFINE(BROKEN_SETREUID) + AC_DEFINE(BROKEN_SETREGID) AC_DEFINE(WITH_ABBREV_NO_TTY) AC_DEFINE(LOCKED_PASSWD_STRING, "*LK*") ;; @@ -714,7 +699,7 @@ AC_CHECK_FUNCS(\ arc4random __b64_ntop b64_ntop __b64_pton b64_pton basename \ bcopy bindresvport_sa clock fchmod fchown freeaddrinfo futimes \ - gai_strerror getaddrinfo getcwd getgrouplist getnameinfo getopt \ + getaddrinfo getcwd getgrouplist getnameinfo getopt \ getpeereid _getpty getrlimit getttyent glob inet_aton \ inet_ntoa inet_ntop innetgr login_getcapbool md5_crypt memmove \ mkdtemp mmap ngetaddrinfo nsleep ogetaddrinfo openlog_r openpty \ @@ -725,6 +710,21 @@ strlcat strlcpy strmode strnvis sysconf tcgetpgrp \ truncate utimes vhangup vsnprintf waitpid \ ) + +# IRIX has a const char return value for gai_strerror() +AC_CHECK_FUNCS(gai_strerror,[ + AC_DEFINE(HAVE_GAI_STRERROR) + AC_TRY_COMPILE([ +#include <sys/types.h> +#include <sys/socket.h> +#include <netdb.h> + +const char *gai_strerror(int);],[ +char *str; + +str = gai_strerror(0);],[ + AC_DEFINE(HAVE_CONST_GAI_STRERROR_PROTO, 1, + [Define if gai_strerror() returns const char *])])]) AC_SEARCH_LIBS(nanosleep, rt posix4, AC_DEFINE(HAVE_NANOSLEEP)) --- openbsd-compat/fake-rfc2553.h.orig Wed Sep 17 05:45:58 2003 +++ openbsd-compat/fake-rfc2553.h Wed Sep 17 08:55:52 2003 @@ -137,7 +137,7 @@ const struct addrinfo *, struct addrinfo **); #endif /* !HAVE_GETADDRINFO */ -#ifndef HAVE_GAI_STRERROR +#if !defined(HAVE_GAI_STRERROR) && !defined(HAVE_CONST_GAI_STRERROR_PROTO) char *gai_strerror(int); #endif /* !HAVE_GAI_STRERROR */ --- openbsd-compat/fake-rfc2553.c.orig Wed Sep 17 05:46:02 2003 +++ openbsd-compat/fake-rfc2553.c Wed Sep 17 08:55:11 2003 @@ -77,7 +77,11 @@ #endif /* !HAVE_GETNAMEINFO */ #ifndef HAVE_GAI_STRERROR +#ifdef HAVE_CONST_GAI_STRERROR_PROTO +const char * +#else char * +#endif gai_strerror(int err) { switch (err) {
This is what is happening on BSD/OS. Script started on Wed Sep 17 06:20:55 2003 doctor.nl2k.ab.ca/~$ssh -v -2 -i ~doctor/.ssh/id_rsa -l doctor uucp OpenSSH_3.7.1p1, SSH protocols 1.5/2.0, OpenSSL 0.9.6j [engine] 10 Apr 2003 debug1: Reading configuration data /usr/contrib/etc/ssh_config debug1: Connecting to uucp [204.209.81.3] port 22. debug1: Connection established. debug1: identity file /usr/home/doctor/.ssh/id_rsa type 1 debug1: Remote protocol version 1.99, remote software version OpenSSH_3.7.1p1 debug1: match: OpenSSH_3.7.1p1 pat OpenSSH* debug1: Enabling compatibility mode for protocol 2.0 debug1: Local version string SSH-2.0-OpenSSH_3.7.1p1 debug1: SSH2_MSG_KEXINIT sent Connection closed by 204.209.81.3 debug1: Calling cleanup 0x80608b0(0x0) doctor.nl2k.ab.ca/~$exit exit Script done on Wed Sep 17 06:21:34 2003 Before I was able to get in 0 problems. -- Member - Liberal International On 11 Sept 2001 the WORLD was violated. This is doctor at nl2k.ab.ca Ici doctor at nl2k.ab.ca Society MUST be saved! Extremists must dissolve. Ontario on 2 Octo 2003, VOTE LIBERAL!!
On Wed, Sep 17, 2003 at 09:19:44AM -0600, The Doctor wrote:> This is what is happening on BSD/OS. > > > Script started on Wed Sep 17 06:20:55 2003 > doctor.nl2k.ab.ca/~$ssh -v -2 -i ~doctor/.ssh/id_rsa -l doctor uucp > OpenSSH_3.7.1p1, SSH protocols 1.5/2.0, OpenSSL 0.9.6j [engine] 10 Apr 2003 > debug1: Reading configuration data /usr/contrib/etc/ssh_config > debug1: Connecting to uucp [204.209.81.3] port 22. > debug1: Connection established. > debug1: identity file /usr/home/doctor/.ssh/id_rsa type 1 > debug1: Remote protocol version 1.99, remote software version OpenSSH_3.7.1p1 > debug1: match: OpenSSH_3.7.1p1 pat OpenSSH* > debug1: Enabling compatibility mode for protocol 2.0 > debug1: Local version string SSH-2.0-OpenSSH_3.7.1p1 > debug1: SSH2_MSG_KEXINIT sent > Connection closed by 204.209.81.3 > debug1: Calling cleanup 0x80608b0(0x0) > doctor.nl2k.ab.ca/~$exit > exit > > Script done on Wed Sep 17 06:21:34 2003Run sshd in debug mode (-D -d -d) and send the output. -- albert chin (china at thewrittenword.com)
On Wed, Sep 17, 2003 at 01:50:22PM -0500, Albert Chin wrote:> On Wed, Sep 17, 2003 at 09:19:44AM -0600, The Doctor wrote: > > This is what is happening on BSD/OS. > > > > > > Script started on Wed Sep 17 06:20:55 2003 > > doctor.nl2k.ab.ca/~$ssh -v -2 -i ~doctor/.ssh/id_rsa -l doctor uucp > > OpenSSH_3.7.1p1, SSH protocols 1.5/2.0, OpenSSL 0.9.6j [engine] 10 Apr 2003 > > debug1: Reading configuration data /usr/contrib/etc/ssh_config > > debug1: Connecting to uucp [204.209.81.3] port 22. > > debug1: Connection established. > > debug1: identity file /usr/home/doctor/.ssh/id_rsa type 1 > > debug1: Remote protocol version 1.99, remote software version OpenSSH_3.7.1p1 > > debug1: match: OpenSSH_3.7.1p1 pat OpenSSH* > > debug1: Enabling compatibility mode for protocol 2.0 > > debug1: Local version string SSH-2.0-OpenSSH_3.7.1p1 > > debug1: SSH2_MSG_KEXINIT sent > > Connection closed by 204.209.81.3 > > debug1: Calling cleanup 0x80608b0(0x0) > > doctor.nl2k.ab.ca/~$exit > > exit > > > > Script done on Wed Sep 17 06:21:34 2003 > > Run sshd in debug mode (-D -d -d) and send the output. >Output gallifrey.nk.ca//usr/source/openssh-3.7.1p1$ sshd -d -d -d debug2: read_server_config: filename /etc/sshd_config /etc/sshd_config line 36: Deprecated option RhostsAuthentication /etc/sshd_config line 57: Unsupported option KerberosAuthentication /etc/sshd_config line 58: Unsupported option KerberosOrLocalPasswd /etc/sshd_config line 59: Unsupported option AFSTokenPassing /etc/sshd_config line 60: Unsupported option KerberosTicketCleanup debug1: sshd version OpenSSH_3.7.1p1 debug1: private host key: #0 type 0 RSA1 debug3: Not a RSA1 key file /etc/ssh_host_rsa_key. debug1: read PEM private key done: type RSA debug1: private host key: #1 type 1 RSA debug3: Not a RSA1 key file /etc/ssh_host_dsa_key. debug1: read PEM private key done: type DSA debug1: private host key: #2 type 2 DSA debug1: setgroups() failed: Invalid argument debug1: Bind to port 22 on ::. Server listening on :: port 22. debug1: Bind to port 22 on 0.0.0.0. Server listening on 0.0.0.0 port 22. Generating 768 bit RSA key. RSA key generation complete.> -- > albert chin (china at thewrittenword.com)-- Member - Liberal International On 11 Sept 2001 the WORLD was violated. This is doctor at nl2k.ab.ca Ici doctor at nl2k.ab.ca Society MUST be saved! Extremists must dissolve. Ontario on 2 Octo 2003, VOTE LIBERAL!!
The Doctor wrote:> > This is what is happening on BSD/OS.Please see this bug: http://bugzilla.mindrot.org/show_bug.cgi?id=657 -- Darren Tucker (dtucker at zip.com.au) GPG key 8FF4FA69 / D9A3 86E9 7EEE AF4B B2D4 37C9 C982 80C7 8FF4 FA69 Good judgement comes with experience. Unfortunately, the experience usually comes from bad judgement.