Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 10 Oct 2001 23:53:19 +0200 (MET DST)
From:      Jan Srzednicki <winfried@student.uci.agh.edu.pl>
To:        <freebsd-security@FreeBSD.ORG>
Subject:   OpenSSH from -STABLE SIGSEGV
Message-ID:  <Pine.GSO.4.30.0110102341050.28922-100000@student.uci.agh.edu.pl>

next in thread | raw e-mail | index | archive | help

Hello,

I have machine with 4.4-STABLE, built on October the 3rd. I have just put
it online, and I noticed something weird in the logs:

Oct 10 23:25:06 spitfire sshd[28568]: Accepted password for rafalg from 192.168.46.6 port 32807
Oct 10 23:25:06 spitfire /kernel: pid 28575 (sshd), uid 0: exited on signal 11 (core dumped)
Oct 10 23:25:06 spitfire sshd[28568]: Disconnecting: Command terminated on signal 11.

It seems only to happen in SSH1 mode, I had no trouble logging in in the
SSH2 mode. I tried to run sshd in debug and that's what I've got:

root@spitfire:/# /usr/sbin/sshd -d -d -d
debug1: sshd version OpenSSH_2.9 FreeBSD localisations 20010713
debug1: private host key: #0 type 0 RSA1
debug3: No RSA1 key file /etc/ssh/ssh_host_dsa_key.
debug1: read PEM private key done: type DSA
debug1: private host key: #1 type 2 DSA
debug1: Bind to port 22 on ::.
Server listening on :: port 22.
debug1: Bind to port 22 on 0.0.0.0.
Server listening on 0.0.0.0 port 22.
Generating 768 bit RSA key.
RSA key generation complete.
debug1: Server will not fork when running in debugging mode.
Connection from stronghold.dywizjonet port 32955
Connection from 192.168.46.205 port 32955
debug1: Client protocol version 1.5; client software version
OpenSSH_2.5.2p2
debug1: match: OpenSSH_2.5.2p2 pat ^OpenSSH_2\.5\.[012]
debug1: Local version string SSH-1.99-OpenSSH_2.9 FreeBSD localisations
20010713
debug1: Rhosts Authentication disabled, originating port not trusted.
debug1: Sent 768 bit server key and 1024 bit host key.
debug1: Encryption type: 3des
debug1: Received session key; encryption turned on.
debug1: Installing crc compensation attack detector.
debug1: Starting up PAM with username "winfried"
debug3: Trying to reverse map address 192.168.46.205.
debug1: Attempting authentication for winfried.
debug1: temporarily_use_uid: 1001/1001 (e=0)
debug1: restore_uid
Failed rsa for winfried from 192.168.46.205 port 32955
debug1: PAM Password authentication accepted for user "winfried"
Accepted password for winfried from 192.168.46.205 port 32955
debug1: PAM setting rhost to "stronghold.dywizjonet"
debug1: session_new: init
debug1: session_new: session 0
debug1: Allocating pty.
debug2: tty_parse_modes: ospeed 38400
debug2: tty_parse_modes: ispeed 38400
debug2: tty_parse_modes: 1 3
debug2: tty_parse_modes: 2 28
debug2: tty_parse_modes: 3 127
debug2: tty_parse_modes: 4 21
debug2: tty_parse_modes: 5 4
debug2: tty_parse_modes: 6 0
debug2: tty_parse_modes: 7 0
debug2: tty_parse_modes: 8 17
debug2: tty_parse_modes: 9 19
debug2: tty_parse_modes: 10 26
debug2: tty_parse_modes: 12 18
debug2: tty_parse_modes: 13 23
debug2: tty_parse_modes: 14 22
debug2: tty_parse_modes: 18 15
debug2: tty_parse_modes: 30 1
debug2: tty_parse_modes: 31 0
debug2: tty_parse_modes: 32 0
debug2: tty_parse_modes: 33 0
debug2: tty_parse_modes: 34 0
debug2: tty_parse_modes: 35 0
debug2: tty_parse_modes: 36 1
debug1: Ignoring unsupported tty mode opcode 37 (0x25)
debug2: tty_parse_modes: 38 1
debug2: tty_parse_modes: 39 0
debug2: tty_parse_modes: 40 0
debug2: tty_parse_modes: 41 1
debug2: tty_parse_modes: 50 1
debug2: tty_parse_modes: 51 1
debug1: Ignoring unsupported tty mode opcode 52 (0x34)
debug2: tty_parse_modes: 53 1
debug2: tty_parse_modes: 54 1
debug2: tty_parse_modes: 55 1
debug2: tty_parse_modes: 56 0
debug2: tty_parse_modes: 57 0
debug2: tty_parse_modes: 58 0
debug2: tty_parse_modes: 59 1
debug2: tty_parse_modes: 60 1
debug2: tty_parse_modes: 61 1
debug2: tty_parse_modes: 62 0
debug2: tty_parse_modes: 70 1
debug1: Ignoring unsupported tty mode opcode 71 (0x47)
debug2: tty_parse_modes: 72 1
debug2: tty_parse_modes: 73 0
debug2: tty_parse_modes: 74 0
debug2: tty_parse_modes: 75 0
debug2: tty_parse_modes: 90 1
debug2: tty_parse_modes: 91 1
debug2: tty_parse_modes: 92 0
debug2: tty_parse_modes: 93 0
debug1: PAM setting tty to "/dev/ttypc"
debug1: do_pam_session: euid 0, uid 0
debug1: PAM establishing creds
debug1: Entering interactive session.
debug1: fd 3 setting O_NONBLOCK
debug1: Setting controlling tty using TIOCSCTTY.
debug1: fd 4 IS O_NONBLOCK
debug1: Received SIGCHLD.
debug1: server_init_dispatch_13
debug1: server_init_dispatch_15
debug3: tvp!=NULL kid 1 mili 100
debug1: End of interactive session; stdin 0, stdout (read 0, sent 0), stderr 0 bytes.
Disconnecting: Command terminated on signal 11.
debug1: Calling cleanup 0x8055de4(0x8086240)
debug1: pty_cleanup_proc: /dev/ttypc
debug1: Calling cleanup 0x8059674(0x0)
debug1: Calling cleanup 0x806003c(0x0)

I have just installed OpenSSH 2.9.9 from ports tree and it works fine. I
used the same config files.

--
Winfried
mail: winfried@dream.vg  http://violent.dream.vg
Warning: Never underestimate the power of stupid people in large numbers.


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.GSO.4.30.0110102341050.28922-100000>