Date: Wed, 10 Oct 2001 23:53:19 +0200 (MET DST) From: Jan Srzednicki <winfried@student.uci.agh.edu.pl> To: <freebsd-security@FreeBSD.ORG> Subject: OpenSSH from -STABLE SIGSEGV Message-ID: <Pine.GSO.4.30.0110102341050.28922-100000@student.uci.agh.edu.pl>
next in thread | raw e-mail | index | archive | help
Hello, I have machine with 4.4-STABLE, built on October the 3rd. I have just put it online, and I noticed something weird in the logs: Oct 10 23:25:06 spitfire sshd[28568]: Accepted password for rafalg from 192.168.46.6 port 32807 Oct 10 23:25:06 spitfire /kernel: pid 28575 (sshd), uid 0: exited on signal 11 (core dumped) Oct 10 23:25:06 spitfire sshd[28568]: Disconnecting: Command terminated on signal 11. It seems only to happen in SSH1 mode, I had no trouble logging in in the SSH2 mode. I tried to run sshd in debug and that's what I've got: root@spitfire:/# /usr/sbin/sshd -d -d -d debug1: sshd version OpenSSH_2.9 FreeBSD localisations 20010713 debug1: private host key: #0 type 0 RSA1 debug3: No RSA1 key file /etc/ssh/ssh_host_dsa_key. debug1: read PEM private key done: type DSA debug1: private host key: #1 type 2 DSA debug1: Bind to port 22 on ::. Server listening on :: port 22. debug1: Bind to port 22 on 0.0.0.0. Server listening on 0.0.0.0 port 22. Generating 768 bit RSA key. RSA key generation complete. debug1: Server will not fork when running in debugging mode. Connection from stronghold.dywizjonet port 32955 Connection from 192.168.46.205 port 32955 debug1: Client protocol version 1.5; client software version OpenSSH_2.5.2p2 debug1: match: OpenSSH_2.5.2p2 pat ^OpenSSH_2\.5\.[012] debug1: Local version string SSH-1.99-OpenSSH_2.9 FreeBSD localisations 20010713 debug1: Rhosts Authentication disabled, originating port not trusted. debug1: Sent 768 bit server key and 1024 bit host key. debug1: Encryption type: 3des debug1: Received session key; encryption turned on. debug1: Installing crc compensation attack detector. debug1: Starting up PAM with username "winfried" debug3: Trying to reverse map address 192.168.46.205. debug1: Attempting authentication for winfried. debug1: temporarily_use_uid: 1001/1001 (e=0) debug1: restore_uid Failed rsa for winfried from 192.168.46.205 port 32955 debug1: PAM Password authentication accepted for user "winfried" Accepted password for winfried from 192.168.46.205 port 32955 debug1: PAM setting rhost to "stronghold.dywizjonet" debug1: session_new: init debug1: session_new: session 0 debug1: Allocating pty. debug2: tty_parse_modes: ospeed 38400 debug2: tty_parse_modes: ispeed 38400 debug2: tty_parse_modes: 1 3 debug2: tty_parse_modes: 2 28 debug2: tty_parse_modes: 3 127 debug2: tty_parse_modes: 4 21 debug2: tty_parse_modes: 5 4 debug2: tty_parse_modes: 6 0 debug2: tty_parse_modes: 7 0 debug2: tty_parse_modes: 8 17 debug2: tty_parse_modes: 9 19 debug2: tty_parse_modes: 10 26 debug2: tty_parse_modes: 12 18 debug2: tty_parse_modes: 13 23 debug2: tty_parse_modes: 14 22 debug2: tty_parse_modes: 18 15 debug2: tty_parse_modes: 30 1 debug2: tty_parse_modes: 31 0 debug2: tty_parse_modes: 32 0 debug2: tty_parse_modes: 33 0 debug2: tty_parse_modes: 34 0 debug2: tty_parse_modes: 35 0 debug2: tty_parse_modes: 36 1 debug1: Ignoring unsupported tty mode opcode 37 (0x25) debug2: tty_parse_modes: 38 1 debug2: tty_parse_modes: 39 0 debug2: tty_parse_modes: 40 0 debug2: tty_parse_modes: 41 1 debug2: tty_parse_modes: 50 1 debug2: tty_parse_modes: 51 1 debug1: Ignoring unsupported tty mode opcode 52 (0x34) debug2: tty_parse_modes: 53 1 debug2: tty_parse_modes: 54 1 debug2: tty_parse_modes: 55 1 debug2: tty_parse_modes: 56 0 debug2: tty_parse_modes: 57 0 debug2: tty_parse_modes: 58 0 debug2: tty_parse_modes: 59 1 debug2: tty_parse_modes: 60 1 debug2: tty_parse_modes: 61 1 debug2: tty_parse_modes: 62 0 debug2: tty_parse_modes: 70 1 debug1: Ignoring unsupported tty mode opcode 71 (0x47) debug2: tty_parse_modes: 72 1 debug2: tty_parse_modes: 73 0 debug2: tty_parse_modes: 74 0 debug2: tty_parse_modes: 75 0 debug2: tty_parse_modes: 90 1 debug2: tty_parse_modes: 91 1 debug2: tty_parse_modes: 92 0 debug2: tty_parse_modes: 93 0 debug1: PAM setting tty to "/dev/ttypc" debug1: do_pam_session: euid 0, uid 0 debug1: PAM establishing creds debug1: Entering interactive session. debug1: fd 3 setting O_NONBLOCK debug1: Setting controlling tty using TIOCSCTTY. debug1: fd 4 IS O_NONBLOCK debug1: Received SIGCHLD. debug1: server_init_dispatch_13 debug1: server_init_dispatch_15 debug3: tvp!=NULL kid 1 mili 100 debug1: End of interactive session; stdin 0, stdout (read 0, sent 0), stderr 0 bytes. Disconnecting: Command terminated on signal 11. debug1: Calling cleanup 0x8055de4(0x8086240) debug1: pty_cleanup_proc: /dev/ttypc debug1: Calling cleanup 0x8059674(0x0) debug1: Calling cleanup 0x806003c(0x0) I have just installed OpenSSH 2.9.9 from ports tree and it works fine. I used the same config files. -- Winfried mail: winfried@dream.vg http://violent.dream.vg Warning: Never underestimate the power of stupid people in large numbers. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.GSO.4.30.0110102341050.28922-100000>