Date: Sun, 13 Oct 2002 13:21:18 +1000 (EST) From: Edwin Groothuis <edwin@mavetju.org> To: FreeBSD-gnats-submit@FreeBSD.org Subject: bin/43994: sshd gives fatal while logging off Message-ID: <20021013032118.8AB716A712B@k7.mavetju>
next in thread | raw e-mail | index | archive | help
>Number: 43994 >Category: bin >Synopsis: sshd gives fatal while logging off >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Sat Oct 12 20:30:01 PDT 2002 >Closed-Date: >Last-Modified: >Originator: Edwin Groothuis >Release: FreeBSD 4.7-RELEASE i386 >Organization: - >Environment: System: FreeBSD friet47.mavetju 4.7-RELEASE FreeBSD 4.7-RELEASE #0: Wed Oct 9 15:08:34 GMT 2002 root@builder.freebsdmall.com:/usr/obj/usr/src/sys/GENERIC i386 Running under VMWare. OS is straight out of the box, no modifications regarding nything yet. >Description: When logging off I see this message coming up on the console: Oct 12 16:32:43 friet47 sshd[122]: fatal: msg_send: write Oct 12 16:32:55 friet47 sshd[7310]: fatal: msg_send: write Running sshd in debug mode (triple -d) I get: debug1: Received SIGCHLD. debug2: notify_done: reading debug1: End of interactive session; stdin 3, stdout (read 2037, sent 2037), stderr 0 bytes. debug1: channel_free: channel 0: auth socket, nchannels 1 debug3: channel_free: status: The following connections are open: debug3: channel_close_fds: channel 0: r 9 w 9 e -1 debug1: Command exited with status 1. debug1: Received exit confirmation. debug1: session_close: session 0 pid 9095 debug1: session_pty_cleanup: session 0 release /dev/ttyp0 debug1: restore_uid Closing connection to 192.168.0.1 debug3: msg_send: type 7 msg_send: write debug1: Calling cleanup 0x805ec88(0x0) debug1: Calling cleanup 0x804d72c(0x0) This is the write in msg.c line 43 (the first one). After some debugging, it's caused by these lines: static void * pam_child(struct pam_ctxt *ctxt) { Buffer buffer; struct pam_conv pam_conv = { pam_child_conv, ctxt }; pam_handle_t *pamh; int pam_err; buffer_init(&buffer); setproctitle("%s [pam]", ctxt->pam_user); pam_err = pam_start("sshd", ctxt->pam_user, &pam_conv, &pamh); if (pam_err != PAM_SUCCESS) goto auth_fail; pam_err = pam_authenticate(pamh, 0); [ pam_err is 19 here: PAM_CONV_ERR: Conversation error ] if (pam_err != PAM_SUCCESS) goto auth_fail; pam_err = pam_acct_mgmt(pamh, 0); >How-To-Repeat: Install a clean 4.7-RELEASE, log in via ssh -1 and logoff. Check the console. >Fix: Beyond my capabilities. Workaround are - ignore it and loose some account management information. - set ChallengeResponseAuthentication to no in /etc/ssh/sshd_config >Release-Note: >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20021013032118.8AB716A712B>