Date: Thu, 17 Oct 2002 15:50:23 -0700 (PDT) From: twig les <twigles@yahoo.com> To: freebsd-security@FreeBSD.ORG Subject: SSH keeps dying while box seems to be up/PC Weasel? Message-ID: <20021017225023.18216.qmail@web10102.mail.yahoo.com>
next in thread | raw e-mail | index | archive | help
Hey all, strange problem here that is probably just bad ram but maybe someone here might see something I missed. I have 2 identical boxes running 4.6 release (patched & stripped down) in another state, so I can't sit on the console and watch stuff. One box is fine, the other is hell in beige. The box keeps becoming unresponsive; the first crash was Saturday morning (note to self - turn off cell phone on Friday) and then again on Sunday and today twice. Each time I have to call remote hands and get them to hard reboot the thing. This box was running happily for about 2-3 months with this config - nothing changed last week. Previously this box ran 4.4 release for almost a year without a single crash. So anyway the debug output from my ssh attempt is below. On a related issue, can anyone recommend the PC Weasel for console access from experience? I can't exactly point my management to their site since it's completely unprofessional (I actually like it, I just can't send management there) so any experience is welcome. =========================================== ssh debug =========================================== Client% ssh -v -v -v Server debug: SshAppCommon/sshappcommon.c:133/ssh_app_get_global_regex_context: Allocating global SshRegex context. debug: SshConfig/sshconfig.c:2232/ssh2_parse_config: Unable to open /opt/home/ktokash/.ssh2/ssh2_config debug: Connecting to mas01, port 22... (SOCKS not used) debug: Ssh2/ssh2.c:1977/main: Entering event loop. debug: Ssh2Client/sshclient.c:1403/ssh_client_wrap: Creating transport protocol. debug: SshAuthMethodClient/sshauthmethodc.c:85/ssh_client_authentication_initialize: Added "hostbased" to usable methods. debug: SshAuthMethodClient/sshauthmethodc.c:85/ssh_client_authentication_initialize: Added "securid-1@ssh.com" to usable methods. debug: SshAuthMethodClient/sshauthmethodc.c:85/ssh_client_authentication_initialize: Added "publickey" to usable methods. debug: SshAuthMethodClient/sshauthmethodc.c:85/ssh_client_authentication_initialize: Added "password" to usable methods. debug: Ssh2Client/sshclient.c:1444/ssh_client_wrap: Creating userauth protocol. debug: client supports 4 auth methods: 'hostbased,securid-1@ssh.com,publickey,password' debug: Ssh2Common/sshcommon.c:560/ssh_common_wrap: local ip = 10.30.150.162, local port = 53843 debug: Ssh2Common/sshcommon.c:562/ssh_common_wrap: remote ip = 10.20.0.124, remote port = 22 debug: SshConnection/sshconn.c:1930/ssh_conn_wrap: Wrapping... debug: Remote version: SSH-1.99-OpenSSH_2.9 FreeBSD localisations 20020307 debug: Ssh2Transport/trcommon.c:1306/ssh_tr_input_version: Remote version has rekey incompatibility bug. debug: Ssh2Transport/trcommon.c:1309/ssh_tr_input_version: Remote version is OpenSSH, KEX guesses disabled. debug: Ssh2Transport/trcommon.c:1648/ssh_tr_negotiate: lang s to c: `', lang c to s: `' debug: Ssh2Transport/trcommon.c:1714/ssh_tr_negotiate: c_to_s: cipher aes128-cbc, mac hmac-sha1, compression none debug: Ssh2Transport/trcommon.c:1717/ssh_tr_negotiate: s_to_c: cipher aes128-cbc, mac hmac-sha1, compression none debug: Remote host key found from database. debug: Ssh2Common/sshcommon.c:318/ssh_common_special: Received SSH_CROSS_STARTUP packet from connection protocol. debug: Ssh2Common/sshcommon.c:368/ssh_common_special: Received SSH_CROSS_ALGORITHMS packet from connection protocol. debug: server offers auth methods 'publickey,password,keyboard-interactive'. debug: SshConfig/sshconfig.c:2232/ssh2_parse_config: Unable to open /opt/home/ktokash/.ssh2/identification debug: Ssh2AuthClient/sshauthc.c:316/ssh_authc_completion_proc: Method 'publickey' disabled. debug: server offers auth methods 'publickey,password,keyboard-interactive'. debug: Ssh2AuthPasswdClient/authc-passwd.c:95/ssh_client_auth_passwd: Starting password query... ktokash's password: debug: Ssh2Common/sshcommon.c:286/ssh_common_special: Received SSH_CROSS_AUTHENTICATED packet from connection protocol. debug: Ssh2Common/sshcommon.c:829/ssh_common_new_channel: num_channels now 1 debug: Ssh2Common/sshcommon.c:155/ssh_common_disconnect: DISCONNECT received: Connection closed. debug: Ssh2/ssh2.c:127/client_disconnect: locally_generated = TRUE Disconnected; connection lost (Connection closed.). debug: Ssh2Client/sshclient.c:1478/ssh_client_destroy: Destroying client. debug: SshConfig/sshconfig.c:537/ssh_config_pki_free: Freeing pki. (host_pki != NULL, user_pki = NULL) debug: SshConnection/sshconn.c:1982/ssh_conn_destroy: Destroying SshConn object. debug: Ssh2Common/sshcommon.c:803/ssh_common_destroy_channel: num_channels now 0 debug: Got session close with exit_status=0 debug: destroying client struct... Connection to mas01 closed. debug: Ssh2Client/sshclient.c:1540/ssh_client_destroy_finalize: Destroying client completed. debug: SshAuthMethodClient/sshauthmethodc.c:89/ssh_client_authentication_uninitialize: Destroying authentication method array. debug: SshAppCommon/sshappcommon.c:146/ssh_app_free_global_regex_context: Freeing global SshRegex context. debug: SshConfig/sshconfig.c:537/ssh_config_pki_free: Freeing pki. (host_pki = NULL, user_pki = NULL) ===== ----------------------------------------------------------- Heavy metal made me do it. ----------------------------------------------------------- __________________________________________________ Do you Yahoo!? Faith Hill - Exclusive Performances, Videos & More http://faith.yahoo.com To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20021017225023.18216.qmail>