SUMMARY : openssh 3.9 client from FC3 logout after authenticate in Solaris 9

From: Angel Alejandro Vega Soto <alejandro.vega_at_tecinfocon.com.mx>
Date: Thu Jun 30 2005 - 18:02:07 EDT
Hello, the respons came about by logging and googling, this is a open
bug if you install solaris patch 118305-04

The problem can have two possibles solutions

1.- Disable x11 forwarding in the sshd_config , by the server
	this doesnB4t work for me because I use x11 over ssh :(

2.- Allow only one of ip in your sshd_config and /etc/init.d/sshd
	I use ipv4 so i change the foloowing line in the /etc/init.d/sshd

"[ -x /usr/lib/ssh/sshd ] && /usr/lib/ssh/sshd -4 &"

	and in the /etc/ssh/sshd_config the

Listen 0.0.0.0 and comment the

Listen :::

a open discussion is at
http://supportforum.sun.com/salerts/index.php?t=msg&th=864&start=0&rid=0


Hope it helps anyone else, and beware with the latest patch cluster !
the original post is below !

Hi, I have the following problem which is pretty weird..

I have my laptop running FC3 with OpenSSH_3.9p1, OpenSSL 0.9.7a Feb 19
2003, which I use to connect to different unix hosts.

in one Solaris 9 the authentication takes place, but it logs me out
before anything can be done, no shell is returned.

this solaris 9 is   Solaris 9 9/04 s9s_u7wos_09 SPARC
, running sshd version Sun_SSH_1.0.1

what is more weird that in other machines running the same solaris
versions, and sun sshd version it works flawlessly.

between solaris the ssh client and daemon works fine, what could it be
wrong ?

I will summarize, heres is the output of a ssh -vv session



[alexpixel@aquiles ~]$ ssh -vv -l guardian maximo
OpenSSH_3.9p1, OpenSSL 0.9.7a Feb 19 2003
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: Applying options for *
debug2: ssh_connect: needpriv 0
debug1: Connecting to maximo [192.168.1.165] port 22.
debug1: Connection established.
debug1: identity file /home/alexpixel/.ssh/identity type -1
debug1: identity file /home/alexpixel/.ssh/id_rsa type -1
debug1: identity file /home/alexpixel/.ssh/id_dsa type -1
debug1: Remote protocol version 2.0, remote software version
Sun_SSH_1.0.1
debug1: match: Sun_SSH_1.0.1 pat Sun_SSH_1.0*
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_3.9p1
debug2: fd 3 setting O_NONBLOCK
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-
hellman-group14-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-
cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-
ctr,aes192-ctr,aes256-ctr
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-
cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-
ctr,aes192-ctr,aes256-ctr
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-
ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-
ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2: kex_parse_kexinit: diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
debug2: kex_parse_kexinit: aes128-cbc,blowfish-cbc,3des-cbc
debug2: kex_parse_kexinit: aes128-cbc,blowfish-cbc,3des-cbc
debug2: kex_parse_kexinit: hmac-sha1,hmac-md5
debug2: kex_parse_kexinit: hmac-sha1,hmac-md5
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit: none,zlib
debug2:
kex_parse_kexinit:
,geo,lcttab,iso_8859_1,iso_8859_15,en_CA,en_CA.ISO8859-1,en_US,en_US.ISO8859-
1,en_US.ISO8859-15,en_US.ISO8859-15@euro,es,es_MX,es_MX.ISO8859-1,fr,fr_CA,fr
_CA.ISO8859-1
debug2:
kex_parse_kexinit:
,geo,lcttab,iso_8859_1,iso_8859_15,en_CA,en_CA.ISO8859-1,en_US,en_US.ISO8859-
1,en_US.ISO8859-15,en_US.ISO8859-15@euro,es,es_MX,es_MX.ISO8859-1,fr,fr_CA,fr
_CA.ISO8859-1
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2: mac_init: found hmac-md5
debug1: kex: server->client aes128-cbc hmac-md5 none
debug2: mac_init: found hmac-md5
debug1: kex: client->server aes128-cbc hmac-md5 none
debug2: dh_gen_key: priv key bits set: 130/256
debug2: bits set: 520/1024
debug1: sending SSH2_MSG_KEXDH_INIT
debug1: expecting SSH2_MSG_KEXDH_REPLY
debug1: Host 'maximo' is known and matches the RSA host key.
debug1: Found key in /home/alexpixel/.ssh/known_hosts:21
debug2: bits set: 533/1024
debug1: ssh_rsa_verify: signature correct
debug2: kex_derive_keys
debug2: set_newkeys: mode 1
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug2: set_newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: SSH2_MSG_SERVICE_REQUEST sent
debug2: service_accept: ssh-userauth
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug2: key: /home/alexpixel/.ssh/identity ((nil))
debug2: key: /home/alexpixel/.ssh/id_rsa ((nil))
debug2: key: /home/alexpixel/.ssh/id_dsa ((nil))
debug1: Authentications that can continue: publickey,password
debug1: Next authentication method: publickey
debug1: Trying private key: /home/alexpixel/.ssh/identity
debug1: Trying private key: /home/alexpixel/.ssh/id_rsa
debug1: Trying private key: /home/alexpixel/.ssh/id_dsa
debug2: we did not send a packet, disable method
debug1: Next authentication method: password
guardian@maximo's password:
debug2: we sent a password packet, wait for reply
debug1: Authentication succeeded (password).
debug1: channel 0: new [client-session]
debug2: channel 0: send open
debug1: Entering interactive session.
debug2: callback start
debug2: x11_get_proto: /usr/X11R6/bin/xauth  list :0.0 . 2>/dev/null
debug1: Requesting X11 forwarding with authentication spoofing.
debug2: channel 0: request x11-req confirm 0
debug2: client_session2_setup: id 0
debug2: channel 0: request pty-req confirm 0
debug2: channel 0: request shell confirm 0
debug2: fd 3 setting TCP_NODELAY
debug2: callback done
debug2: channel 0: open confirm rwindow 0 rmax 16384
debug2: channel 0: rcvd adjust 32768
debug2: channel 0: rcvd eof
debug2: channel 0: output open -> drain
debug1: channel 0: forcing write
Last login: Thu Jun 30 13:19:32 2005 from 192.168.1.100
debug2: channel 0: obuf empty
debug2: channel 0: close_write
debug2: channel 0: output drain -> closed
debug1: channel 0: free: client-session, nchannels 1
Connection to maximo closed by remote host.
Connection to maximo closed.
debug1: Transferred: stdin 0, stdout 0, stderr 75 bytes in 0.5 seconds
debug1: Bytes per second: stdin 0.0, stdout 0.0, stderr 148.1
debug1: Exit status -1

--
Ing. Cngel Alejandro Vega Soto                          (52)55-23-19-75
TecnologC-a InformC!tica y ConsultorC-a                    (52)53-36-95-28
alejandro.vega_at_tecinfocon.com.mx           http://www.tecinfocon.com.mx
Gerente de Servicio, Solaris - Linux, Software and protocols specialist

--
Ing. Cngel Alejandro Vega Soto                          (52)55-23-19-75
TecnologC-a InformC!tica y ConsultorC-a                    (52)53-36-95-28
alejandro.vega_at_tecinfocon.com.mx           http://www.tecinfocon.com.mx
Gerente de Servicio, Solaris - Linux, Software and protocols specialist

[demime 1.01b removed an attachment of type application/pgp-signature which had a name of signature.asc]
_______________________________________________
sunmanagers mailing list
sunmanagers@sunmanagers.org
http://www.sunmanagers.org/mailman/listinfo/sunmanagers
Received on Thu Jun 30 18:02:54 2005

This archive was generated by hypermail 2.1.8 : Thu Mar 03 2016 - 06:43:49 EST