Am Sonntag 30 Januar 2005 21:37 schrieb Konstantin Seiler: > Package: ssh > Version: 1:3.8.1p1-8.sarge.4 > Severity: important > > > When upgrading from a 2.4-Kernel to 2.6, sshd is unable to handle > X-forwarding. > > Debug-Output of sshd follows: > > Restarting OpenBSD Secure Shell server: sshddebug1: sshd version > OpenSSH_3.8.1p1 Debian-8.sarge.4 debug1: private host key: #0 type 0 RSA1 > debug1: read PEM private key done: type RSA > debug1: private host key: #1 type 1 RSA > debug1: read PEM private key done: type DSA > debug1: private host key: #2 type 2 DSA > socket: Address family not supported by protocol > debug1: Bind to port 22 on 0.0.0.0. > Server listening on 0.0.0.0 port 22. > debug1: Server will not fork when running in debugging mode. > Connection from 132.230.75.74 port 55348 > debug1: Client protocol version 2.0; client software version > OpenSSH_3.8.1p1 Debian-8.sarge.4 debug1: match: OpenSSH_3.8.1p1 > Debian-8.sarge.4 pat OpenSSH* > debug1: Enabling compatibility mode for protocol 2.0 > debug1: Local version string SSH-2.0-OpenSSH_3.8.1p1 Debian-8.sarge.4 > debug1: list_hostkey_types: ssh-rsa,ssh-dss > debug1: SSH2_MSG_KEXINIT sent > debug1: SSH2_MSG_KEXINIT received > debug1: kex: client->server aes128-cbc hmac-md5 none > debug1: kex: server->client aes128-cbc hmac-md5 none > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST received > debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent > debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT > debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent > debug1: SSH2_MSG_NEWKEYS sent > debug1: expecting SSH2_MSG_NEWKEYS > debug1: SSH2_MSG_NEWKEYS received > debug1: KEX done > debug1: userauth-request for user kaymes service ssh-connection method none > debug1: attempt 0 failures 0 > debug1: PAM: initializing for "kaymes" > debug1: PAM: setting PAM_RHOST to "lanai.physik.uni-freiburg.de" > debug1: PAM: setting PAM_TTY to "ssh" > Failed none for kaymes from 132.230.75.74 port 55348 ssh2 > debug1: userauth-request for user kaymes service ssh-connection method > publickey debug1: attempt 1 failures 1 > debug1: test whether pkalg/pkblob are acceptable > debug1: temporarily_use_uid: 1014/1014 (e=0/0) > debug1: trying public key file /home/kaymes/.ssh/authorized_keys > debug1: matching key found: file /home/kaymes/.ssh/authorized_keys, line 1 > Found matching RSA key: bf:41:0b:52:e0:72:ec:f7:62:e2:c1:e1:2d:04:b1:87 > debug1: restore_uid: 0/0 > Postponed publickey for kaymes from 132.230.75.74 port 55348 ssh2 > debug1: userauth-request for user kaymes service ssh-connection method > publickey debug1: attempt 2 failures 1 > debug1: temporarily_use_uid: 1014/1014 (e=0/0) > debug1: trying public key file /home/kaymes/.ssh/authorized_keys > debug1: matching key found: file /home/kaymes/.ssh/authorized_keys, line 1 > Found matching RSA key: bf:41:0b:52:e0:72:ec:f7:62:e2:c1:e1:2d:04:b1:87 > debug1: restore_uid: 0/0 > debug1: ssh_rsa_verify: signature correct > Accepted publickey for kaymes from 132.230.75.74 port 55348 ssh2 > debug1: Entering interactive session for SSH2. > debug1: server_init_dispatch_20 > debug1: server_input_channel_open: ctype session rchan 0 win 65536 max > 16384 debug1: input_session_request > debug1: channel 0: new [server-session] > debug1: session_new: init > debug1: session_new: session 0 > debug1: session_open: channel 0 > debug1: session_open: session 0: link with channel 0 > debug1: server_input_channel_open: confirm session > debug1: server_input_channel_req: channel 0 request pty-req reply 0 > debug1: session_by_channel: session 0 channel 0 > debug1: session_input_channel_req: session 0 req pty-req > debug1: Allocating pty. > debug1: session_pty_req: session 0 alloc /dev/pts/0 > debug1: server_input_channel_req: channel 0 request x11-req reply 0 > debug1: session_by_channel: session 0 channel 0 > debug1: session_input_channel_req: session 0 req x11-req > debug1: x11_create_display_inet: Socket family 10 not supported > debug1: x11_create_display_inet: Socket family 10 not supported > debug1: x11_create_display_inet: Socket family 10 not supported > debug1: x11_create_display_inet: Socket family 10 not supported > > [ MANY MANY identical lines skipped ] > > debug1: x11_create_display_inet: Socket family 10 not supported > debug1: x11_create_display_inet: Socket family 10 not supported > debug1: x11_create_display_inet: Socket family 10 not supported > debug1: x11_create_display_inet: Socket family 10 not supported > Failed to allocate internet-domain X11 display socket. > debug1: x11_create_display_inet failed. > debug1: server_input_channel_req: channel 0 request > [EMAIL PROTECTED] reply 0 debug1: session_by_channel: session 0 > channel 0 > debug1: session_input_channel_req: session 0 req [EMAIL PROTECTED] > debug1: temporarily_use_uid: 1014/1014 (e=0/0) > debug1: restore_uid: 0/0 > debug1: channel 1: new [auth socket] > debug1: server_input_channel_req: channel 0 request shell reply 0 > debug1: session_by_channel: session 0 channel 0 > debug1: session_input_channel_req: session 0 req shell > debug1: PAM: setting PAM_TTY to "/dev/pts/0" > debug1: PAM: establishing credentials > debug1: Setting controlling tty using TIOCSCTTY. > debug1: server_input_channel_req: channel 0 request window-change reply 0 > debug1: session_by_channel: session 0 channel 0 > debug1: session_input_channel_req: session 0 req window-change > > Now the Session was established. > > > -- System Information: > Debian Release: 3.1 > APT prefers testing > APT policy: (500, 'testing') > Architecture: i386 (i686) > Kernel: Linux 2.6.8-client > Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15) > > Versions of packages ssh depends on: > ii adduser 3.59 Add and remove users and > groups ii debconf 1.4.30.11 Debian configuration > management sy ii dpkg 1.10.26 Package > maintenance system for Deb ii libc6 2.3.2.ds1-20 GNU > C Library: Shared libraries an ii libpam-modules 0.76-22 > Pluggable Authentication Modules f ii libpam-runtime 0.76-22 > Runtime support for the PAM librar ii libpam0g > 0.76-22 Pluggable Authentication Modules l ii libssl0.9.7 > 0.9.7e-2 SSL shared libraries > ii libwrap0 7.6.dbs-6 Wietse Venema's TCP wrappers > libra ii zlib1g 1:1.2.2-3 compression library - > runtime > > -- debconf information excluded
-- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]