From nobody Tue Jan 11 06:03:33 2022 X-Original-To: freebsd-arm@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id B09B3193C158 for ; Tue, 11 Jan 2022 06:03:46 +0000 (UTC) (envelope-from marklmi@yahoo.com) Received: from sonic315-8.consmr.mail.gq1.yahoo.com (sonic315-8.consmr.mail.gq1.yahoo.com [98.137.65.32]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4JY0W638jVz3J3r for ; Tue, 11 Jan 2022 06:03:46 +0000 (UTC) (envelope-from marklmi@yahoo.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1641881019; bh=Mr8j36cNmn5GZWv3ratnXIRBc4fOnHLaoPibmFL3r8M=; h=Subject:From:In-Reply-To:Date:Cc:References:To:From:Subject:Reply-To; b=ueeBooQMjdfJ87esUoi0EKk1jZC/eO/6b3RB85Zr8/QDHZPhJrtVOQxLNhom9SmoGauzBdC+qn93poPqRNVkaQTn7P06ScRKRCCxEp6DfALRwSO3ZccFAKGKvCvSUGsjJPFQ9/jbYbZ3qg9jx/gw01yRDrkrwd045s4VR3C0sjHF4evv1xhFZZiaoqIgis+7T/QD4uwWfjEi6UZ5PSMpMp2wHnSdSS6s0kMz2Qff3kUKfJ+7Qz1Y6/VVIoxmzMW/b05PWJuY5CDZgd4a1LWOF2PiSGtw8p6Y2K7qFskb201kejK69tY5TCX+4BXMi6wxFjFMH4TtFSqB6M7dy9U0sg== X-SONIC-DKIM-SIGN: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1641881019; bh=DLl8f2+NNGrCbRmk1RPtMmSuk7iTiNMI5h2tV/++yok=; h=X-Sonic-MF:Subject:From:Date:To:From:Subject; b=exadNB2Lw90x1dFhWlIKSoKvKVLsJWs26h+Fcq1Z4sJyUN094bYLpgcIG6SEX6M3d1Cnh716m7hmUJiYCN3WYZWylSu9XmUDOnbvfBLmH+GdrF0+L+wEbqLLGh7MgPSZCSQNpbmEiWhsmrX7ZivAIaX1r9gLU4nYhOIiiUZzqs3i2N3KsZAsSyR449Jqyt+aX6H1G7JBOWwiusAqugH7Cd0QUYUxLrreYpEVIwbkCRFXQXZ/p5CCIx38fFj4wZWW74CBS8heZIj8u16Ki1TPyDI1W2LKtm+rXsZK5GNfTOX1m9d4aZR76/8wFjmaRQF3TY37kFTJ5o5tzPzcAb3LAg== X-YMail-OSG: lq2jofIVM1nPFgDIiTLOaVZjKztqb8Dhd_5dLMj5cEhLqGh5hlcatnOUOn0O9i4 mGEFwWO1fEonTyjVz4JsaqbzFaRHEk1RkgBBC.rk3k0_dhXeGijsJkySfAfysGxV8UrrhWSjttLi ceMFaZxXVSlgcXXnXgAETUvlTMvKrJyr9CuHC4uR.8WscBjvmTJqQGUlbIsEABigxWBDavv0jWjr o0weAdoGevz_iIh4q54_uUWe8CXnK1fmcZMo5wTTJV5bcUFGv_NqOcjIhMH0Fr2krbFfcT.BUrdz EdcpppKo5s1daklmbBkZaWPuPzrUuO0_Lk9FwZFvv.F1tkY2kwy3TlW.lvTji1ZYjLSSZG.FuiL_ b8H6RQNf1Cwjvk2qOJGKe6fn7LfmR.j7AZnfLW.0ZY6uBtaDvUqL7VlSZPMFdAswKNF.UjyrGz.e DUUDecejr7QWRXO0yU7259mJXREAd2CrKfM7ichgtXaBCKFXUiRWrNyFFPbAkN.HVi6enjAboZq7 scJfpx5A.PfVkm1AkkyPoWx72fbrztHtFmzNuHCr9EV__UtaXmbmwRq9FvYVXBRVahMjlA9559Qp pwEQb9OXIYBrVfFKqgkJSkDbY.f.rP0Q29PvhChW2I.Z6znLtyLtP5wISuz8ZN7MZOfiAuQHzvmS 14cBAguXvz3e08UWZce6r7qKvU7OnKJL6X2PkhX6OUxc476FQfL9Ojza7t2Qf9B0OY7jKP_0TY0j TBMdjFBzqi6xr5X6mWvPAhzwvTxLPyvwute5G1yFagth79708MUNIWs8VZU9MDymOyp.rHrFc8Pc oI3ZtlpowOhU6GrgpcYiXgd1Jq1UI3IyfscfFEgVAWHcVwVmRt_1EOZ.X4y1.dwwrG0Uu2jefhz5 vey2zxtKzCf47Uwp_WCEtEZwaPteAAXIHSlKxyt3NK4MXeRoatkhDGk5AYgp4fB9yuk4GyDmFys7 G.7e32Afx9bcwsIT1J02P6XKedBdGyk10VhX.h0twBMLlt4ITA43C_SODIZ6NcX1_80sTYX4Mep9 BYbt9dMiRllgeXBy3YIJ2_dyTT7C3axgs49scIFDB8BW0QBK7w58MnOy.WmBUKH0WHom0c1zemW7 CqciVQnN.2sVUnqbczcuLUXS3VCEHIetQ.2LrPCBI5J4hFcCzqAWd9NmkxjJQNC.32gJM3c6RocF V4oT4DoBXN9kdGJP7x4AyN42tC8kLEoPlkGqhlh96a6Zu6VVElMRJl4m2rx6rIGItoATgAdP2fJN FKjbnMK6.si5bvAlU_ry8eccl2XFdmjwx2T4NSlvK4wT3ZK.9pu9PfMffGwmY0bYKp_voXqlUjdM gWfCQFwsH4XB28wWX8s0f.939mVl_byiUvaOyIUJaukiNbGRr_hD2MPvi2zk7MI7recBHnocqfqI epcDmC0oxt.rC8_WIG3EL4_1rZUqIKXwiCbWnPAtXq55aV78g0a2rGDt_by446JpHJt5eUbPLIR6 paryzrfuGg.M4522bGVprSiuwHGGMnuvheMCC7u1w.KRFm90GitHfqwZFoAKVhKwlrjqe1hrlGF_ j.cmQ45LHt7eDlC8Gx.0lEpe6s3i4MP7JMnlpUbXqJbdcq41C7UZWhqpIWO7odiD_fOrf_20LApJ NZUFyay8BBnejAgYeYBBQkV.A82KohB.ysIhPTBRsow7k6p_2yikphkpTyKNtKT.anvAEiK3PwN6 GX99S_ZTV69XVNFECeDK_qmzlr9_VvLTPtpFL7bIq5CyGlyYlZ1xsIq6tMSLemHYhEwUuhcrTZPp J9gNzna03ipl9lNa.fqz7AE8XGaU86VHoUonCsK_EKy3_RIPf3pSZpmJD0IZV3gamItgFihErZ8j PXaE2YO3Psmw0ScY.UkCsEgFhakiE3cFURMr8NIkhiEHI1SfVEGFFXVbD3Te_FwoQdrp_497D1UH 7bDvPhbKxeMiZBf7FDFb.67D21LXFquT7qZfJeK8z2NwOOYEHZQyaE.HvEH4dkPJ3faxx4t0D9A2 uivq7S_07g_mN0Hda7nUdfuO0lvvSLLMTvOQT2w82R_evXqUqD2kSl2pe_eHzqsTt5aJGgdBN7yn z2I418CMcOAr1kA7kkHfaNC3JrTPQbFyEdH7U25z0wTSCatExOqa7XQY40Hv8w5RRvnIXowLcesT XDPGACMyIG1AY1MU2UU7M2QFT3J2BUx94U1R1ErNKXFbHPjJe5o.gKo0BMxBpytbdtmkZKJLw.0t G1iCPEnRXZ_rFBBN9VkMnl9hMmU7579AWB7wBu2nk.tb3uRwjNLhR3SBqHzKBQHuGVuC8Oe8bgsQ XMpNJwQNGClMWJYV. X-Sonic-MF: Received: from sonic.gate.mail.ne1.yahoo.com by sonic315.consmr.mail.gq1.yahoo.com with HTTP; Tue, 11 Jan 2022 06:03:39 +0000 Received: by kubenode522.mail-prod1.omega.bf1.yahoo.com (VZM Hermes SMTP Server) with ESMTPA ID 77655850f2482800ad3abe29399d0d82; Tue, 11 Jan 2022 06:03:35 +0000 (UTC) Content-Type: text/plain; charset=us-ascii List-Id: Porting FreeBSD to ARM processors List-Archive: https://lists.freebsd.org/archives/freebsd-arm List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-arm@freebsd.org Mime-Version: 1.0 (Mac OS X Mail 14.0 \(3654.120.0.1.13\)) Subject: Re: SSH login failing on stable/13 From: Mark Millard In-Reply-To: <20220111053443.GA73926@www.zefox.net> Date: Mon, 10 Jan 2022 22:03:33 -0800 Cc: freebsd-arm@freebsd.org Content-Transfer-Encoding: quoted-printable Message-Id: References: <20220110193917.GA74116@www.zefox.net> <19F80CC0-B7B0-4929-9FA0-460BBF35AADE@yahoo.com> <20220111053443.GA73926@www.zefox.net> To: bob prohaska X-Mailer: Apple Mail (2.3654.120.0.1.13) X-Rspamd-Queue-Id: 4JY0W638jVz3J3r X-Spamd-Bar: ---- Authentication-Results: mx1.freebsd.org; none X-Spamd-Result: default: False [-4.00 / 15.00]; REPLY(-4.00)[] X-ThisMailContainsUnwantedMimeParts: N Status: O Content-Length: 4835 Lines: 130 On 2022-Jan-10, at 21:34, bob prohaska wrote: > On Mon, Jan 10, 2022 at 12:34:57PM -0800, Mark Millard wrote: >> On 2022-Jan-10, at 11:39, bob prohaska wrote: >>=20 >>> A Pi3 running stable/13 updated yesterday has stopped accepting ssh = logins. >>> The problem appeared after an update a couple days ago. The update = was=20 >>> repeated yesterday in hopes of catching some missing details, but no = luck. >>>=20 >>> A session originated from RaspiOS with -vvv ends showing only=20 >>> debug3: authmethod_lookup keyboard-interactive >>> debug3: remaining preferred: password >>> debug3: authmethod_is_enabled keyboard-interactive >>> debug1: Next authentication method: keyboard-interactive >>> debug2: userauth_kbdint >>> debug3: send packet: type 50 >>> debug2: we sent a keyboard-interactive packet, wait for reply >>> debug3: receive packet: type 60 >>> debug2: input_userauth_info_req >>> debug2: input_userauth_info_req: num_prompts 1 >>> Password for bob@pelorus.zefox.org: >>> debug3: send packet: type 61 >>=20 >> 61 is, apparently, SSH_MSG_USERAUTH_INFO_RESPONSE >> (No surprise.) >>=20 >>> Connection closed by 50.1.20.24 port 22 >>>=20 >>> The "connection closed" took a couple of minutes to appear. >>> Other ssh connections to older versions of FreeBSD seem to >>> work normally. I looked at bugzilla, nothing recent about >>> ssh.=20 >>=20 >> As a means of information gathering, when the RPi3 is running >> and older FreeBSD, can you try the -vvv activity and report >> the debug output, going a few packets past the type 61 notice >> to see what would normally be next? >>=20 > Alas, no. I updated both of my Pi3's recently, and both seem > to have similar problems.=20 Why not put a recent snapshot or artifacts build on a microsd card and try just that? Similarly for checking an older release, from a time frame you know your build(s) for your context were working? No need to mess up your normal-use context. If only your normal-use contexts fail, that would be interesting information as well. >> Also, do you have an alternative to using RaspiOS (or, even, >> avoiding Linux) for such a test?: checking if it is somehow >> specific to FreeBDS vs. RaspiOS/Linux or not? (Another FreeBSD >> or NetBSD or . . . For FreeBSD, trying having both machines >> using the problematical FreeBDS version could be interesting >> if that is the only combination that works, for example.) >>=20 > Yes, I've tried a Pi2 running 12.3, which ends with > debug2: we sent a keyboard-interactive packet, wait for reply > debug3: receive packet: type 60 > debug2: input_userauth_info_req > debug2: input_userauth_info_req: num_prompts 1 > Password for bob@pelorus.zefox.org: > debug3: send packet: type 61 > Connection closed by 50.1.20.24 port 22 >=20 > Also tried 14-current, same outcome. Intersting. >> Have you checked for any console messages, dmesg -a output, >> or less /var/log/messages output that might be related? >> (This likely would require serial console access.) >=20 > Yes, I have serial console access and there's been nothing > on the console. >=20 > One oddity, however. If I send pings to the troublesome host > one or two packets make it back with normal round trip time.=20 > Then silence. Then a few more packets: The way I read the below, icmp_seq=3D0 and icmp_seq=3D1 took more time than icmp_seq=3D58 and icmp_seq=3D117 and the like. But lots of icmp_seq values did not complete a round trip. Also: 58-1 =3D=3D 57 176-118 =3D=3D 58 235-177 =3D=3D 58 It looks like the start of a pattern already. > bob@nemesis:~ % ping pelorus.zefox.org > PING pelorus.zefox.org (50.1.20.24): 56 data bytes > 64 bytes from 50.1.20.24: icmp_seq=3D0 ttl=3D63 time=3D2.976 ms > 64 bytes from 50.1.20.24: icmp_seq=3D1 ttl=3D63 time=3D2.073 ms > 64 bytes from 50.1.20.24: icmp_seq=3D58 ttl=3D63 time=3D1.662 ms > 64 bytes from 50.1.20.24: icmp_seq=3D117 ttl=3D63 time=3D1.519 ms > 64 bytes from 50.1.20.24: icmp_seq=3D118 ttl=3D63 time=3D1.555 ms > 64 bytes from 50.1.20.24: icmp_seq=3D176 ttl=3D63 time=3D1.570 ms > 64 bytes from 50.1.20.24: icmp_seq=3D177 ttl=3D63 time=3D1.586 ms > 64 bytes from 50.1.20.24: icmp_seq=3D235 ttl=3D63 time=3D1.528 ms=20 > I'll let it run overnight, perhaps a pattern will emerge. Intersting. I wonder what various statistics are like over such activities on both sides of the communications. Dropped packets? Other types of error counts? (I do not claim to know much about what statistics are available or the implications of what might be reported.) > Bootup is normal, time setting is successful and outgoing > connections seem normal.=20 >=20 > I'm trying to finish an update to the Pi3 running -current > (via serial console) and will shortly see if that works any > better. >=20 =3D=3D=3D Mark Millard marklmi at yahoo.com