Date: Sat, 6 Dec 2025 09:10:51 -0500 From: TR Kellers <trkellers@gmail.com> To: "Xavier B." <somenxavier@posteo.net> Cc: questions@freebsd.org Subject: Re: My system is broken after upgrade to 14 tpo 15.0 Message-ID: <2942849E-77D3-4053-8D5E-58FE9C0C6EE1@gmail.com> In-Reply-To: <20251206144004.be9da55bcaec39873b31848a@posteo.net>
index | next in thread | previous in thread | raw e-mail
[-- Attachment #1 --] According to DES… "`pkg-static install misc/compat14x` will install a copy of libutil.so <http://libutil.so/>.9. DES -- Dag-Erling Smørgrav - des@FreeBSD.org <mailto:des@FreeBSD.org>" > On Dec 6, 2025, at 8:40 AM, Xavier B. <somenxavier@posteo.net> wrote: > > After freebsd-update.... I received the error: > > ld-elf.so.1: Shared object "libutil.so.9" not found, required by "pkg" > > Same with doas. > > > I put the full error log here. Any hints? I need to reinstall full system from scratch? > > Thanks in advance, > Xavier > > > Press Enter to edit this file in /usr/bin/vi and resolve the conflicts > manually... > > > # $OpenBSD: sshd_config,v 1.105 2024/12/03 14:12:47 dtucker Exp $ > > # This is the sshd server system-wide configuration file. See > # sshd_config(5) for more information. > > # This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin > > # The strategy used for options in the default sshd_config shipped with > # OpenSSH is to specify options with their default value where > # possible, but leave them commented. Uncommented options override the > # default value. > > # Note that some of FreeBSD's defaults differ from OpenBSD's, and > # FreeBSD has a few additional options. > > #Port 22 > #AddressFamily any > #ListenAddress 0.0.0.0 > #ListenAddress :: > > #HostKey /etc/ssh/ssh_host_rsa_key > #HostKey /etc/ssh/ssh_host_ecdsa_key > HostKey /etc/ssh/ssh_host_ed25519_key > > # Ciphers and keying > #RekeyLimit default none > > # Logging > #SyslogFacility AUTH > #LogLevel INFO > > # Authentication: > > AllowUsers xan isabel > LoginGraceTime 1m > PermitRootLogin no > StrictModes yes > MaxAuthTries 3 > MaxSessions 3 > > PubkeyAuthentication yes > > # The default is to check both .ssh/authorized_keys and .ssh/authorized_keys2 > # but this is overridden so installations will only check .ssh/authorized_keys > AuthorizedKeysFile .ssh/authorized_keys > > #AuthorizedPrincipalsFile none > > #AuthorizedKeysCommand none > #AuthorizedKeysCommandUser nobody > > # For this to work you will also need host keys in /etc/ssh/ssh_known_hosts > #HostbasedAuthentication no > # Change to yes if you don't trust ~/.ssh/known_hosts for > # HostbasedAuthentication > #IgnoreUserKnownHosts no > # Don't read the user's ~/.rhosts and ~/.shosts files > #IgnoreRhosts yes > > <<<<<<< current version > # Change to yes to enable built-in password authentication. > PasswordAuthentication no > AuthenticationMethods publickey > ======= > # Change to "yes" to enable built-in password authentication. > # Note that passwords may also be accepted via KbdInteractiveAuthentication. > #PasswordAuthentication no > #PermitEmptyPasswords no >>>>>>>> 15.0-RELEASE > > # Change to "no" to disable keyboard-interactive authentication. Depending on > # the system's configuration, this may involve passwords, challenge-response, > # one-time passwords or some combination of these and other methods. > # Keyboard interactive authentication is also used for PAM authentication. > #KbdInteractiveAuthentication yes > > # Kerberos options > #KerberosAuthentication no > #KerberosOrLocalPasswd yes > #KerberosTicketCleanup yes > #KerberosGetAFSToken no > > # GSSAPI options > #GSSAPIAuthentication no > #GSSAPICleanupCredentials yes > > # Set this to 'no' to disable PAM authentication, account processing, > # and session processing. If this is enabled, PAM authentication will > # be allowed through the KbdInteractiveAuthentication and > # PasswordAuthentication. Depending on your PAM configuration, > # PAM authentication via KbdInteractiveAuthentication may bypass > # the setting of "PermitRootLogin prohibit-password". > # If you just want the PAM account and session checks to run without > # PAM authentication, then enable this but set PasswordAuthentication > # and ChallengeResponseAuthentication to 'no'. > UsePAM yes > # and KbdInteractiveAuthentication to 'no'. > > #AllowAgentForwarding yes > #AllowTcpForwarding yes > GatewayPorts no > X11Forwarding no > #X11DisplayOffset 10 > #X11UseLocalhost yes > #PermitTTY yes > PrintMotd no > #PrintLastLog yes > TCPKeepAlive yes > PermitUserEnvironment no > Compression yes > ClientAliveInterval 30 > ClientAliveCountMax 3 > UseDNS no > #PidFile /var/run/sshd.pid > MaxStartups 10:30:100 > PermitTunnel no > #ChrootDirectory none > #UseBlocklist no > #VersionAddendum FreeBSD-20250801 > > # no default banner path > #Banner none > > # override default of no subsystems > Subsystem sftp /usr/libexec/sftp-server > > # Example of overriding settings on a per-user basis > #Match User anoncvs > # X11Forwarding no > # AllowTcpForwarding no > # PermitTTY no > # ForceCommand cvs server > :q! > > Merge conflict markers remain in: /etc/ssh/sshd_config > These must be resolved for the system to be functional. > > Press Enter to return to editing this file, or type "ACCEPT" to carry on with > these lines remaining in the file. > > > # $OpenBSD: sshd_config,v 1.105 2024/12/03 14:12:47 dtucker Exp $ > > # This is the sshd server system-wide configuration file. See > # sshd_config(5) for more information. > > # This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin > > # The strategy used for options in the default sshd_config shipped with > # OpenSSH is to specify options with their default value where > # possible, but leave them commented. Uncommented options override the > # default value. > > # Note that some of FreeBSD's defaults differ from OpenBSD's, and > # FreeBSD has a few additional options. > > #Port 22 > #AddressFamily any > #ListenAddress 0.0.0.0 > #ListenAddress :: > > #HostKey /etc/ssh/ssh_host_rsa_key > #HostKey /etc/ssh/ssh_host_ecdsa_key > HostKey /etc/ssh/ssh_host_ed25519_key > > # Ciphers and keying > #RekeyLimit default none > > # Logging > #SyslogFacility AUTH > #LogLevel INFO > > # Authentication: > > AllowUsers xan isabel > LoginGraceTime 1m > PermitRootLogin no > StrictModes yes > MaxAuthTries 3 > MaxSessions 3 > > PubkeyAuthentication yes > > # The default is to check both .ssh/authorized_keys and .ssh/authorized_keys2 > # but this is overridden so installations will only check .ssh/authorized_keys > AuthorizedKeysFile .ssh/authorized_keys > > #AuthorizedPrincipalsFile none > > #AuthorizedKeysCommand none > #AuthorizedKeysCommandUser nobody > :x > > Merge conflict markers remain in: /etc/ssh/sshd_config > These must be resolved for the system to be functional. > > Press Enter to return to editing this file, or type "ACCEPT" to carry on with > these lines remaining in the file. > > > # $OpenBSD: sshd_config,v 1.105 2024/12/03 14:12:47 dtucker Exp $ > > # This is the sshd server system-wide configuration file. See > # sshd_config(5) for more information. > > # This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin > > # The strategy used for options in the default sshd_config shipped with > # OpenSSH is to specify options with their default value where > # possible, but leave them commented. Uncommented options override the > # default value. > > # Note that some of FreeBSD's defaults differ from OpenBSD's, and > # FreeBSD has a few additional options. > > #Port 22 > #AddressFamily any > #ListenAddress 0.0.0.0 > #ListenAddress :: > > #HostKey /etc/ssh/ssh_host_rsa_key > #HostKey /etc/ssh/ssh_host_ecdsa_key > HostKey /etc/ssh/ssh_host_ed25519_key > > # Ciphers and keying > #RekeyLimit default none > > # Logging > #SyslogFacility AUTH > #LogLevel INFO > > # Authentication: > > AllowUsers xan isabel > LoginGraceTime 1m > PermitRootLogin no > StrictModes yes > MaxAuthTries 3 > MaxSessions 3 > > PubkeyAuthentication yes > > # The default is to check both .ssh/authorized_keys and .ssh/authorized_keys2 > # but this is overridden so installations will only check .ssh/authorized_keys > AuthorizedKeysFile .ssh/authorized_keys > > #AuthorizedPrincipalsFile none > > #AuthorizedKeysCommand none > #AuthorizedKeysCommandUser nobody > :x > > Merge conflict markers remain in: /etc/ssh/sshd_config > These must be resolved for the system to be functional. > > Press Enter to return to editing this file, or type "ACCEPT" to carry on with > these lines remaining in the file. > > > # $OpenBSD: sshd_config,v 1.105 2024/12/03 14:12:47 dtucker Exp $ > > # This is the sshd server system-wide configuration file. See > # sshd_config(5) for more information. > > # This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin > > # The strategy used for options in the default sshd_config shipped with > # OpenSSH is to specify options with their default value where > # possible, but leave them commented. Uncommented options override the > # default value. > > # Note that some of FreeBSD's defaults differ from OpenBSD's, and > # FreeBSD has a few additional options. > > #Port 22 > #AddressFamily any > #ListenAddress 0.0.0.0 > #ListenAddress :: > > #HostKey /etc/ssh/ssh_host_rsa_key > #HostKey /etc/ssh/ssh_host_ecdsa_key > HostKey /etc/ssh/ssh_host_ed25519_key > > # Ciphers and keying > #RekeyLimit default none > > # Logging > #SyslogFacility AUTH > #LogLevel INFO > > # Authentication: > > AllowUsers xan isabel > LoginGraceTime 1m > PermitRootLogin no > StrictModes yes > MaxAuthTries 3 > MaxSessions 3 > > PubkeyAuthentication yes > > # The default is to check both .ssh/authorized_keys and .ssh/authorized_keys2 > # but this is overridden so installations will only check .ssh/authorized_keys > AuthorizedKeysFile .ssh/authorized_keys > > #AuthorizedPrincipalsFile none > > #AuthorizedKeysCommand none > #AuthorizedKeysCommandUser nobody > :x > > Merge conflict markers remain in: /etc/ssh/sshd_config > These must be resolved for the system to be functional. > > Press Enter to return to editing this file, or type "ACCEPT" to carry on with > these lines remaining in the file. > ACCEPT > > > The following changes, which occurred between FreeBSD 14.3-RELEASE and > FreeBSD 15.0-RELEASE have been merged into /etc/login.conf: > --- current version > +++ new version > @@ -44,11 +44,10 @@ > :pseudoterminals=unlimited:\ > :kqueues=unlimited:\ > :umtxp=unlimited:\ > :pipebuf=unlimited:\ > :priority=0:\ > - :ignoretime@:\ > :umask=022:\ > :charset=UTF-8:\ > :lang=C.UTF-8: > > # > @@ -147,11 +146,10 @@ > # :maxproc=32:\ > # :priority=0:\ > # :requirehome:\ > # :passwordtime=90d:\ > # :umask=002:\ > -# :ignoretime@:\ > # :tc=default: > # > # > ## > ## users of X (needs more resources!) > @@ -172,11 +170,10 @@ > ## > ## Staff users - few restrictions and allow login anytime > ## > #staff:\ > # :ignorenologin:\ > -# :ignoretime:\ > # :requirehome@:\ > # :accounted@:\ > # :path=~/bin /bin /sbin /usr/bin /usr/sbin /usr/local/bin /usr/local/sbin:\ > # :umask=022:\ > # :tc=standard: > @@ -263,11 +260,10 @@ > ## > ## Site full-time 24/7 PPP connection > ## - no time accounting, restricted to access via dialin lines > ## > #site:\ > -# :ignoretime:\ > # :passwordtime@:\ > # :refreshtime@:\ > # :refreshperiod@:\ > # :sessionlimit@:\ > # :autodelete@:\ > Does this look reasonable (y/n)? y > > The following changes, which occurred between FreeBSD 14.3-RELEASE and > FreeBSD 15.0-RELEASE have been merged into /etc/ssh/sshd_config: > --- current version > +++ new version > @@ -1,6 +1,6 @@ > -# $OpenBSD: sshd_config,v 1.104 2021/07/02 05:11:21 dtucker Exp $ > +# $OpenBSD: sshd_config,v 1.105 2024/12/03 14:12:47 dtucker Exp $ > > # This is the sshd server system-wide configuration file. See > # sshd_config(5) for more information. > > # This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin > @@ -55,15 +55,25 @@ > # HostbasedAuthentication > #IgnoreUserKnownHosts no > # Don't read the user's ~/.rhosts and ~/.shosts files > #IgnoreRhosts yes > > +<<<<<<< current version > # Change to yes to enable built-in password authentication. > PasswordAuthentication no > AuthenticationMethods publickey > +======= > +# Change to "yes" to enable built-in password authentication. > +# Note that passwords may also be accepted via KbdInteractiveAuthentication. > +#PasswordAuthentication no > +#PermitEmptyPasswords no > +>>>>>>> 15.0-RELEASE > > -# Change to no to disable PAM authentication > +# Change to "no" to disable keyboard-interactive authentication. Depending on > +# the system's configuration, this may involve passwords, challenge-response, > +# one-time passwords or some combination of these and other methods. > +# Keyboard interactive authentication is also used for PAM authentication. > #KbdInteractiveAuthentication yes > > # Kerberos options > #KerberosAuthentication no > #KerberosOrLocalPasswd yes > @@ -103,12 +113,12 @@ > UseDNS no > #PidFile /var/run/sshd.pid > MaxStartups 10:30:100 > PermitTunnel no > #ChrootDirectory none > -#UseBlacklist no > -#VersionAddendum FreeBSD-20250219 > +#UseBlocklist no > +#VersionAddendum FreeBSD-20250801 > > # no default banner path > #Banner none > > # override default of no subsystems > Does this look reasonable (y/n)? y > > The following changes, which occurred between FreeBSD 14.3-RELEASE and > FreeBSD 15.0-RELEASE have been merged into /etc/ttys: > --- current version > +++ new version > @@ -1,8 +1,5 @@ > -# > -# @(#)ttys 5.1 (Berkeley) 4/17/89 > -# > # This file specifies various information about terminals on the system. > # It is used by several different programs. Common entries for the > # various columns include: > # > # name The name of the terminal device. > Does this look reasonable (y/n)? y > The following files are affected by updates. No changes have > been downloaded, however, because the files have been modified > locally: > /etc/ssl/cert.pem > The following files will be removed as part of updating to > 15.0-RELEASE-p0: > /.cshrc > /.profile > /boot/kernel/callout_test.ko > /boot/kernel/geom_bde.ko > /boot/kernel/geom_vinum.ko > /boot/kernel/iwm3160fw.ko > /boot/kernel/iwm3168fw.ko > /boot/kernel/iwm7260fw.ko > /boot/kernel/iwm7265Dfw.ko > /boot/kernel/iwm7265fw.ko > /boot/kernel/iwm8000Cfw.ko > /boot/kernel/iwm8265fw.ko > /boot/kernel/iwm9000fw.ko > /boot/kernel/iwm9260fw.ko > /boot/kernel/rtw8723d_fw.bin.ko > /boot/kernel/rtw8821c_fw.bin.ko > /boot/kernel/rtw8822b_fw.bin.ko > /boot/kernel/rtw8822c_fw.bin.ko > /boot/kernel/rtw8822c_wow_fw.bin.ko > /boot/zfsboot > /etc/ftpusers > /etc/gss/qop > /etc/newsyslog.conf.d/ftp.conf > /etc/rc.d/ftpd > /etc/rc.d/gbde > /etc/rc.d/ipropd_master > /etc/rc.d/ipropd_slave > /etc/rc.d/keyserv > /etc/rc.d/kfd > /etc/rc.d/kpasswdd > /etc/rc.d/opensm > /etc/syslog.d/ftp.conf > /lib/libcrypto.so.30 > /lib/libmd.so.6 > /lib/libufs.so.7 > /lib/libutil.so.9 > /rescue/gbde > /sbin/gbde > /sbin/gvinum > /usr/bin/asn1_compile > /usr/bin/chkey > /usr/bin/dialog > /usr/bin/dpv > /usr/bin/hxtool > /usr/bin/kcc > /usr/bin/keylogin > /usr/bin/keylogout > /usr/bin/kf > The following files will be added as part of updating to > 15.0-RELEASE-p0: > /boot/firmware/iwm3160fw > /boot/firmware/iwm3168fw > /boot/firmware/iwm7260fw > /boot/firmware/iwm7265Dfw > /boot/firmware/iwm7265fw > /boot/firmware/iwm8000C > /boot/firmware/iwm8265fw > /boot/firmware/iwm9000fw > /boot/firmware/iwm9260fw > /boot/fonts/32x64.fnt.gz > /boot/images/freebsd-install-brand-rev.png > /boot/kernel/accf_tls.ko > /boot/kernel/acpi_sbl_wmi.ko > /boot/kernel/amdsmu.ko > /boot/kernel/dummymbuf.ko > /boot/kernel/e6000sw.ko > /boot/kernel/etherswitch.ko > /boot/kernel/hwt.ko > /boot/kernel/i2ctinyusb.ko > /boot/kernel/if_iwx.ko > /boot/kernel/if_mtw.ko > /boot/kernel/miiproxy.ko > /boot/kernel/nvmf.ko > /boot/kernel/nvmf_tcp.ko > /boot/kernel/nvmf_transport.ko > /boot/kernel/nvmft.ko > /boot/kernel/p9fs.ko > /boot/kernel/pflow.ko > /boot/kernel/pt.ko > /boot/kernel/rdseed_rng.ko > /boot/kernel/snd_hdsp.ko > /boot/kernel/t7fw_cfg.ko > /boot/kernel/u2f.ko > /boot/kernel/udbc.ko > /boot/kernel/ufshci.ko > /boot/kernel/umb.ko > /boot/kernel/virtio_p9fs.ko > /boot/kernel/wlan_gcmp.ko > /boot/kernel/wtap.ko > /boot/loader.help.kboot > /boot/loader.kboot > /boot/lua/gfx-install.lua > /etc/blocklistd.conf > /etc/devd/nvmf.conf > /etc/devd/snd.conf > /etc/dma/auth.conf > /etc/moused.conf > /etc/rc.d/blocklistd > The following files will be updated as part of updating to > 15.0-RELEASE-p0: > /COPYRIGHT > /bin/[ > /bin/cat > /bin/chflags > /bin/chio > /bin/chmod > /bin/cp > /bin/cpuset > /bin/csh > /bin/date > /bin/dd > /bin/df > /bin/domainname > /bin/echo > /bin/ed > /bin/expr > /bin/freebsd-version > /bin/getfacl > /bin/hostname > /bin/kenv > /bin/kill > /bin/link > /bin/ln > /bin/ls > /bin/mkdir > /bin/mv > /bin/nproc > /bin/pax > /bin/pgrep > /bin/pkill > /bin/ps > /bin/pwait > /bin/pwd > /bin/realpath > /bin/red > /bin/rm > /bin/rmail > /bin/rmdir > /bin/setfacl > /bin/sh > /bin/sleep > /bin/stty > /bin/sync > /bin/tcsh > /bin/test > /bin/timeout > /bin/unlink > /bin/uuidgen > To install the downloaded upgrades, run 'freebsd-update [options] install'. > [root@hero /usr/home/xan]# freebsd-update install > src component not installed, skipped > Installing updates... > Kernel updates have been installed. Please reboot and run > 'freebsd-update [options] install' again to finish installing updates. > [root@hero /usr/home/xan]# reboot > Connection to hero closed by remote host. > Connection to hero closed. > [xan@coronari ~]$ ssh hero > ssh: connect to host hero port 22: No route to host > [xan@coronari ~]$ ssh hero > ssh: connect to host hero port 22: No route to host > [xan@coronari ~]$ ssh hero > ssh: connect to host hero port 22: Connection refused > [xan@coronari ~]$ ssh hero > ssh: connect to host hero port 22: Connection refused > [xan@coronari ~]$ ssh hero > ssh: connect to host hero port 22: Connection refused > [xan@coronari ~]$ ssh hero > ssh: connect to host hero port 22: Connection refused > [xan@coronari ~]$ ssh hero > ssh: connect to host hero port 22: Connection refused > [xan@coronari ~]$ ssh hero > ssh: connect to host hero port 22: Connection refused > [xan@coronari ~]$ ssh hero > ssh: connect to host hero port 22: Connection refused > [xan@coronari ~]$ ssh hero > ssh: connect to host hero port 22: Connection refused > [xan@coronari ~]$ ssh hero > ssh: connect to host hero port 22: Connection refused > [xan@coronari ~]$ ssh hero > ssh: connect to host hero port 22: Connection refused > [xan@coronari ~]$ ssh hero > ssh: connect to host hero port 22: Connection refused > [xan@coronari ~]$ ssh hero > ssh: connect to host hero port 22: Connection refused > [xan@coronari ~]$ ssh hero > ssh: connect to host hero port 22: Connection refused > [xan@coronari ~]$ ssh hero > ssh: connect to host hero port 22: Connection refused > [xan@coronari ~]$ ssh hero > ssh: connect to host hero port 22: Connection refused > [xan@coronari ~]$ ssh hero > ssh: connect to host hero port 22: Connection refused > [xan@coronari ~]$ ssh hero > ssh: connect to host hero port 22: Connection refused > [xan@coronari ~]$ ssh hero > ssh: connect to host hero port 22: Connection refused > [xan@coronari ~]$ ssh hero > ssh: connect to host hero port 22: Connection refused > [xan@coronari ~]$ ssh hero > ssh: connect to host hero port 22: Connection refused > [xan@coronari ~]$ ssh hero > ssh: connect to host hero port 22: Connection refused > [xan@coronari ~]$ ssh hero > ssh: connect to host hero port 22: Connection refused > [xan@coronari ~]$ ssh hero > ssh: connect to host hero port 22: Connection refused > [xan@coronari ~]$ ssh hero > ssh: connect to host hero port 22: Connection refused > [xan@coronari ~]$ ssh hero > ssh: connect to host hero port 22: Connection refused > [xan@coronari ~]$ ssh hero > ssh: connect to host hero port 22: Connection refused > [xan@coronari ~]$ ssh hero > ssh: connect to host hero port 22: Connection refused > [xan@coronari ~]$ ssh hero > ssh: connect to host hero port 22: Connection refused > [xan@coronari ~]$ ssh hero > ssh: connect to host hero port 22: Connection refused > [xan@coronari ~]$ ssh hero > ssh: connect to host hero port 22: Connection refused > [xan@coronari ~]$ ssh hero > ssh: connect to host hero port 22: Connection refused > [xan@coronari ~]$ ssh hero > ssh: connect to host hero port 22: Connection refused > [xan@coronari ~]$ ssh hero > ssh: connect to host hero port 22: Connection refused > [xan@coronari ~]$ ssh hero > ssh: connect to host hero port 22: Connection refused > [xan@coronari ~]$ ssh hero > ssh: connect to host hero port 22: Connection refused > [xan@coronari ~]$ ssh hero > ssh: connect to host hero port 22: Connection refused > [xan@coronari ~]$ ssh hero > ssh: connect to host hero port 22: Connection refused > [xan@coronari ~]$ ssh hero > ssh: connect to host hero port 22: Connection refused > [xan@coronari ~]$ ssh hero > ssh: connect to host hero port 22: Connection refused > [xan@coronari ~]$ ssh hero > ssh: connect to host hero port 22: Connection refused > [xan@coronari ~]$ ssh hero > ssh: connect to host hero port 22: Connection refused > [xan@coronari ~]$ ssh hero > ssh: connect to host hero port 22: Connection refused > [xan@coronari ~]$ ssh hero > ssh: connect to host hero port 22: Connection refused > [xan@coronari ~]$ ssh hero > Last login: Fri Dec 5 10:01:06 2025 from 192.168.1.141 > [xan@hero ~]$ doas -s > Password: > [root@hero /usr/home/xan]# freebsd-update install > src component not installed, skipped > Installing updates... > Restarting sshd after upgrade > Performing sanity check on sshd configuration. > /etc/ssh/sshd_config: line 60: Bad configuration option: <<<<<<< > /etc/ssh/sshd_config: line 69: Bad configuration option: >>>>>>> > /etc/ssh/sshd_config: terminating, 2 bad configuration options > > Completing this upgrade requires removing old shared object files. > Please rebuild all installed 3rd party software (e.g., programs > installed from the ports tree) and then run > 'freebsd-update [options] install' again to finish installing updates. > [root@hero /usr/home/xan]# freebsd-update install > pkg: Warning: Major OS version upgrade detected. Running "pkg bootstrap -f" recommended > src component not installed, skipped > Installing updates... done. > [root@hero /usr/home/xan]# pkg bootstrap -f > ld-elf.so.1: Shared object "libutil.so.9" not found, required by "pkg" > [root@hero /usr/home/xan]# pkg install ld-elf > ld-elf.so.1: Shared object "libutil.so.9" not found, required by "pkg" > [root@hero /usr/home/xan]# pkg bootstrap -f > ld-elf.so.1: Shared object "libutil.so.9" not found, required by "pkg" > [root@hero /usr/home/xan]# freebsd-update install > src component not installed, skipped > No updates are available to install. > Run 'freebsd-update [options] fetch' first. > [root@hero /usr/home/xan]# vim /etc/ssh/ > moduli ssh_config ssh_host_ecdsa_key ssh_host_ecdsa_key.pub ssh_host_ed25519_key ssh_host_ed25519_key.pub ssh_host_rsa_key ssh_host_rsa_key.pub sshd_config > [root@hero /usr/home/xan]# vim /etc/ssh/sshd_config > > > # Authentication: > > AllowUsers xan isabel > LoginGraceTime 1m > PermitRootLogin no > StrictModes yes > MaxAuthTries 3 > MaxSessions 3 > > PubkeyAuthentication yes > > # The default is to check both .ssh/authorized_keys and .ssh/authorized_keys2 > # but this is overridden so installations will only check .ssh/authorized_keys > AuthorizedKeysFile .ssh/authorized_keys > > #AuthorizedPrincipalsFile none > > #AuthorizedKeysCommand none > #AuthorizedKeysCommandUser nobody > > # For this to work you will also need host keys in /etc/ssh/ssh_known_hosts > #HostbasedAuthentication no > # Change to yes if you don't trust ~/.ssh/known_hosts for > # HostbasedAuthentication > #IgnoreUserKnownHosts no > # Don't read the user's ~/.rhosts and ~/.shosts files > #IgnoreRhosts yes > > <<<<<<< current version > # Change to yes to enable built-in password authentication. > PasswordAuthentication no > AuthenticationMethods publickey > ======= > # Change to "yes" to enable built-in password authentication. > # Note that passwords may also be accepted via KbdInteractiveAuthentication. > #PasswordAuthentication no > #PermitEmptyPasswords no >>>>>>>> 15.0-RELEASE > > # Change to "no" to disable keyboard-interactive authentication. Depending on > # the system's configuration, this may involve passwords, challenge-response, > # one-time passwords or some combination of these and other methods. > # Keyboard interactive authentication is also used for PAM authentication. > #KbdInteractiveAuthentication yes > > # Kerberos options > #KerberosAuthentication no > #KerberosOrLocalPasswd yes > #KerberosTicketCleanup yes > "/etc/ssh/sshd_config" 132L, 3788B 75,2 36% > > # $OpenBSD: sshd_config,v 1.105 2024/12/03 14:12:47 dtucker Exp $ > > # This is the sshd server system-wide configuration file. See > # $OpenBSD: sshd_config,v 1.105 2024/12/03 14:12:47 dtucker Exp $ > > # This is the sshd server system-wide configuration file. See > # sshd_config(5) for more information. > > # This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin > > # The strategy used for options in the default sshd_config shipped with > # OpenSSH is to specify options with their default value where > # possible, but leave them commented. Uncommented options override the > # default value. > > # Note that some of FreeBSD's defaults differ from OpenBSD's, and > # FreeBSD has a few additional options. > > #Port 22 > #AddressFamily any > #ListenAddress 0.0.0.0 > #ListenAddress :: > > #HostKey /etc/ssh/ssh_host_rsa_key > #HostKey /etc/ssh/ssh_host_ecdsa_key > HostKey /etc/ssh/ssh_host_ed25519_key > > # Ciphers and keying > #RekeyLimit default none > > # Logging > #SyslogFacility AUTH > #LogLevel INFO > > # Authentication: > > AllowUsers xan isabel > LoginGraceTime 1m > PermitRootLogin no > StrictModes yes > MaxAuthTries 3 > MaxSessions 3 > > PubkeyAuthentication yes > > # The default is to check both .ssh/authorized_keys and .ssh/authorized_keys2 > # but this is overridden so installations will only check .ssh/authorized_keys > AuthorizedKeysFile .ssh/authorized_keys > > #AuthorizedPrincipalsFile none > > #AuthorizedKeysCommand none > #AuthorizedKeysCommandUser nobody > > # For this to work you will also need host keys in /etc/ssh/ssh_known_hosts > #HostbasedAuthentication no > # Change to yes if you don't trust ~/.ssh/known_hosts for > # HostbasedAuthentication > #IgnoreUserKnownHosts no > # Don't read the user's ~/.rhosts and ~/.shosts files > #IgnoreRhosts yes > > # Change to yes to enable built-in password authentication. > PasswordAuthentication no > AuthenticationMethods publickey > # Change to "yes" to enable built-in password authentication. > # Note that passwords may also be accepted via KbdInteractiveAuthentication. > #PasswordAuthentication no > #PermitEmptyPasswords no > > # Change to "no" to disable keyboard-interactive authentication. Depending on > # the system's configuration, this may involve passwords, challenge-response, > # one-time passwords or some combination of these and other methods. > # Keyboard interactive authentication is also used for PAM authentication. > #KbdInteractiveAuthentication yes > > # Kerberos options > #KerberosAuthentication no > #KerberosOrLocalPasswd yes > #KerberosTicketCleanup yes > #KerberosGetAFSToken no > > # GSSAPI options > #GSSAPIAuthentication no > #GSSAPICleanupCredentials yes > > # Set this to 'no' to disable PAM authentication, account processing, > # and session processing. If this is enabled, PAM authentication will > # be allowed through the KbdInteractiveAuthentication and > # PasswordAuthentication. Depending on your PAM configuration, > # PAM authentication via KbdInteractiveAuthentication may bypass > # the setting of "PermitRootLogin prohibit-password". > # If you just want the PAM account and session checks to run without > # PAM authentication, then enable this but set PasswordAuthentication > 81,1 51% > # If you just want the PAM account and session checks to run without > # PAM authentication, then enable this but set PasswordAuthentication > # and ChallengeResponseAuthentication to 'no'. > UsePAM yes > # and KbdInteractiveAuthentication to 'no'. > > #AllowAgentForwarding yes > #AllowTcpForwarding yes > GatewayPorts no > X11Forwarding no > #X11DisplayOffset 10 > #X11UseLocalhost yes > #PermitTTY yes > PrintMotd no > #PrintLastLog yes > TCPKeepAlive yes > PermitUserEnvironment no > Compression yes > ClientAliveInterval 30 > ClientAliveCountMax 3 > UseDNS no > #PidFile /var/run/sshd.pid > MaxStartups 10:30:100 > PermitTunnel no > #ChrootDirectory none > #UseBlocklist no > #VersionAddendum FreeBSD-20250801 > > # no default banner path > #Banner none > > # override default of no subsystems > Subsystem sftp /usr/libexec/sftp-server > > # Example of overriding settings on a per-user basis > #Match User anoncvs > # X11Forwarding no > # AllowTcpForwarding no > # PermitTTY no > # ForceCommand cvs server > ~ > ~ > ~ > ~ > ~ > ~ > ~ > ~ > ~ > ~ > ~ > ~ > ~ > ~ > ~ > ~ > ~ > ~ > ~ > ~ > ~ > ~ > ~ > ~ > ~ > ~ > ~ > ~ > ~ > ~ > ~ > ~ > ~ > ~ > ~ > ~ > ~ > ~ > ~ > ~ > ~ > ~ > ~ > ~ > ~ > ~ > ~ > ~ > ~ > "/etc/ssh/sshd_config" 129L, 3735B written > [root@hero /usr/home/xan]# reboot > Read from remote host hero: Connection reset by peer > Connection to hero closed. > client_loop: send disconnect: Broken pipe > [xan@coronari ~]$ ssh hero > ssh: connect to host hero port 22: No route to host > [xan@coronari ~]$ ssh hero > Last login: Fri Dec 5 10:16:38 2025 from 192.168.1.141 > [xan@hero ~]$ doas -s > ld-elf.so.1: Shared object "libutil.so.9" not found, required by "doas" > [xan@hero ~]$ > > > [-- Attachment #2 --] <html aria-label="message body"><head><meta http-equiv="content-type" content="text/html; charset=utf-8"></head><body style="overflow-wrap: break-word; -webkit-nbsp-mode: space; line-break: after-white-space;">According to DES…<div><br><div>"`pkg-static install misc/compat14x` will install a copy of <a href="http://libutil.so/">libutil.so</a>.9.<br><br>DES<br>-- <br>Dag-Erling Smørgrav - <a href="mailto:des@FreeBSD.org">des@FreeBSD.org</a>"<br id="lineBreakAtBeginningOfMessage"><div><br><blockquote type="cite"><div>On Dec 6, 2025, at 8:40 AM, Xavier B. <somenxavier@posteo.net> wrote:</div><br class="Apple-interchange-newline"><div><div>After freebsd-update.... I received the error:<br><br>ld-elf.so.1: Shared object "libutil.so.9" not found, required by "pkg"<br><br>Same with doas.<br><br><br>I put the full error log here. Any hints? I need to reinstall full system from scratch?<br><br>Thanks in advance,<br>Xavier<br><br><br>Press Enter to edit this file in /usr/bin/vi and resolve the conflicts<br>manually...<br><br><br># $OpenBSD: sshd_config,v 1.105 2024/12/03 14:12:47 dtucker Exp $<br><br># This is the sshd server system-wide configuration file. See<br># sshd_config(5) for more information.<br><br># This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin<br><br># The strategy used for options in the default sshd_config shipped with<br># OpenSSH is to specify options with their default value where<br># possible, but leave them commented. Uncommented options override the<br># default value.<br><br># Note that some of FreeBSD's defaults differ from OpenBSD's, and<br># FreeBSD has a few additional options.<br><br>#Port 22<br>#AddressFamily any<br>#ListenAddress 0.0.0.0<br>#ListenAddress ::<br><br>#HostKey /etc/ssh/ssh_host_rsa_key<br>#HostKey /etc/ssh/ssh_host_ecdsa_key<br>HostKey /etc/ssh/ssh_host_ed25519_key<br><br># Ciphers and keying<br>#RekeyLimit default none<br><br># Logging<br>#SyslogFacility AUTH<br>#LogLevel INFO<br><br># Authentication:<br><br>AllowUsers xan isabel<br>LoginGraceTime 1m<br>PermitRootLogin no<br>StrictModes yes<br>MaxAuthTries 3<br>MaxSessions 3<br><br>PubkeyAuthentication yes<br><br># The default is to check both .ssh/authorized_keys and .ssh/authorized_keys2<br># but this is overridden so installations will only check .ssh/authorized_keys<br>AuthorizedKeysFile .ssh/authorized_keys<br><br>#AuthorizedPrincipalsFile none<br><br>#AuthorizedKeysCommand none<br>#AuthorizedKeysCommandUser nobody<br><br># For this to work you will also need host keys in /etc/ssh/ssh_known_hosts<br>#HostbasedAuthentication no<br># Change to yes if you don't trust ~/.ssh/known_hosts for<br># HostbasedAuthentication<br>#IgnoreUserKnownHosts no<br># Don't read the user's ~/.rhosts and ~/.shosts files<br>#IgnoreRhosts yes<br><br><<<<<<< current version<br># Change to yes to enable built-in password authentication.<br>PasswordAuthentication no<br>AuthenticationMethods publickey<br>=======<br># Change to "yes" to enable built-in password authentication.<br># Note that passwords may also be accepted via KbdInteractiveAuthentication.<br>#PasswordAuthentication no<br>#PermitEmptyPasswords no<br><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">15.0-RELEASE<br></blockquote></blockquote></blockquote></blockquote></blockquote></blockquote></blockquote><br># Change to "no" to disable keyboard-interactive authentication. Depending on<br># the system's configuration, this may involve passwords, challenge-response,<br># one-time passwords or some combination of these and other methods.<br># Keyboard interactive authentication is also used for PAM authentication.<br>#KbdInteractiveAuthentication yes<br><br># Kerberos options<br>#KerberosAuthentication no<br>#KerberosOrLocalPasswd yes<br>#KerberosTicketCleanup yes<br>#KerberosGetAFSToken no<br><br># GSSAPI options<br>#GSSAPIAuthentication no<br>#GSSAPICleanupCredentials yes<br><br># Set this to 'no' to disable PAM authentication, account processing,<br># and session processing. If this is enabled, PAM authentication will<br># be allowed through the KbdInteractiveAuthentication and<br># PasswordAuthentication. Depending on your PAM configuration,<br># PAM authentication via KbdInteractiveAuthentication may bypass<br># the setting of "PermitRootLogin prohibit-password".<br># If you just want the PAM account and session checks to run without<br># PAM authentication, then enable this but set PasswordAuthentication<br># and ChallengeResponseAuthentication to 'no'.<br>UsePAM yes<br># and KbdInteractiveAuthentication to 'no'.<br><br>#AllowAgentForwarding yes<br>#AllowTcpForwarding yes<br>GatewayPorts no<br>X11Forwarding no<br>#X11DisplayOffset 10<br>#X11UseLocalhost yes<br>#PermitTTY yes<br>PrintMotd no<br>#PrintLastLog yes<br>TCPKeepAlive yes<br>PermitUserEnvironment no<br>Compression yes<br>ClientAliveInterval 30<br>ClientAliveCountMax 3<br>UseDNS no<br>#PidFile /var/run/sshd.pid<br>MaxStartups 10:30:100<br>PermitTunnel no<br>#ChrootDirectory none<br>#UseBlocklist no<br>#VersionAddendum FreeBSD-20250801<br><br># no default banner path<br>#Banner none<br><br># override default of no subsystems<br>Subsystem sftp /usr/libexec/sftp-server<br><br># Example of overriding settings on a per-user basis<br>#Match User anoncvs<br># X11Forwarding no<br># AllowTcpForwarding no<br># PermitTTY no<br># ForceCommand cvs server<br>:q!<br><br>Merge conflict markers remain in: /etc/ssh/sshd_config<br>These must be resolved for the system to be functional.<br><br>Press Enter to return to editing this file, or type "ACCEPT" to carry on with<br>these lines remaining in the file.<br><br><br># $OpenBSD: sshd_config,v 1.105 2024/12/03 14:12:47 dtucker Exp $<br><br># This is the sshd server system-wide configuration file. See<br># sshd_config(5) for more information.<br><br># This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin<br><br># The strategy used for options in the default sshd_config shipped with<br># OpenSSH is to specify options with their default value where<br># possible, but leave them commented. Uncommented options override the<br># default value.<br><br># Note that some of FreeBSD's defaults differ from OpenBSD's, and<br># FreeBSD has a few additional options.<br><br>#Port 22<br>#AddressFamily any<br>#ListenAddress 0.0.0.0<br>#ListenAddress ::<br><br>#HostKey /etc/ssh/ssh_host_rsa_key<br>#HostKey /etc/ssh/ssh_host_ecdsa_key<br>HostKey /etc/ssh/ssh_host_ed25519_key<br><br># Ciphers and keying<br>#RekeyLimit default none<br><br># Logging<br>#SyslogFacility AUTH<br>#LogLevel INFO<br><br># Authentication:<br><br>AllowUsers xan isabel<br>LoginGraceTime 1m<br>PermitRootLogin no<br>StrictModes yes<br>MaxAuthTries 3<br>MaxSessions 3<br><br>PubkeyAuthentication yes<br><br># The default is to check both .ssh/authorized_keys and .ssh/authorized_keys2<br># but this is overridden so installations will only check .ssh/authorized_keys<br>AuthorizedKeysFile .ssh/authorized_keys<br><br>#AuthorizedPrincipalsFile none<br><br>#AuthorizedKeysCommand none<br>#AuthorizedKeysCommandUser nobody<br>:x<br><br>Merge conflict markers remain in: /etc/ssh/sshd_config<br>These must be resolved for the system to be functional.<br><br>Press Enter to return to editing this file, or type "ACCEPT" to carry on with<br>these lines remaining in the file.<br><br><br># $OpenBSD: sshd_config,v 1.105 2024/12/03 14:12:47 dtucker Exp $<br><br># This is the sshd server system-wide configuration file. See<br># sshd_config(5) for more information.<br><br># This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin<br><br># The strategy used for options in the default sshd_config shipped with<br># OpenSSH is to specify options with their default value where<br># possible, but leave them commented. Uncommented options override the<br># default value.<br><br># Note that some of FreeBSD's defaults differ from OpenBSD's, and<br># FreeBSD has a few additional options.<br><br>#Port 22<br>#AddressFamily any<br>#ListenAddress 0.0.0.0<br>#ListenAddress ::<br><br>#HostKey /etc/ssh/ssh_host_rsa_key<br>#HostKey /etc/ssh/ssh_host_ecdsa_key<br>HostKey /etc/ssh/ssh_host_ed25519_key<br><br># Ciphers and keying<br>#RekeyLimit default none<br><br># Logging<br>#SyslogFacility AUTH<br>#LogLevel INFO<br><br># Authentication:<br><br>AllowUsers xan isabel<br>LoginGraceTime 1m<br>PermitRootLogin no<br>StrictModes yes<br>MaxAuthTries 3<br>MaxSessions 3<br><br>PubkeyAuthentication yes<br><br># The default is to check both .ssh/authorized_keys and .ssh/authorized_keys2<br># but this is overridden so installations will only check .ssh/authorized_keys<br>AuthorizedKeysFile .ssh/authorized_keys<br><br>#AuthorizedPrincipalsFile none<br><br>#AuthorizedKeysCommand none<br>#AuthorizedKeysCommandUser nobody<br>:x<br><br>Merge conflict markers remain in: /etc/ssh/sshd_config<br>These must be resolved for the system to be functional.<br><br>Press Enter to return to editing this file, or type "ACCEPT" to carry on with<br>these lines remaining in the file.<br><br><br># $OpenBSD: sshd_config,v 1.105 2024/12/03 14:12:47 dtucker Exp $<br><br># This is the sshd server system-wide configuration file. See<br># sshd_config(5) for more information.<br><br># This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin<br><br># The strategy used for options in the default sshd_config shipped with<br># OpenSSH is to specify options with their default value where<br># possible, but leave them commented. Uncommented options override the<br># default value.<br><br># Note that some of FreeBSD's defaults differ from OpenBSD's, and<br># FreeBSD has a few additional options.<br><br>#Port 22<br>#AddressFamily any<br>#ListenAddress 0.0.0.0<br>#ListenAddress ::<br><br>#HostKey /etc/ssh/ssh_host_rsa_key<br>#HostKey /etc/ssh/ssh_host_ecdsa_key<br>HostKey /etc/ssh/ssh_host_ed25519_key<br><br># Ciphers and keying<br>#RekeyLimit default none<br><br># Logging<br>#SyslogFacility AUTH<br>#LogLevel INFO<br><br># Authentication:<br><br>AllowUsers xan isabel<br>LoginGraceTime 1m<br>PermitRootLogin no<br>StrictModes yes<br>MaxAuthTries 3<br>MaxSessions 3<br><br>PubkeyAuthentication yes<br><br># The default is to check both .ssh/authorized_keys and .ssh/authorized_keys2<br># but this is overridden so installations will only check .ssh/authorized_keys<br>AuthorizedKeysFile .ssh/authorized_keys<br><br>#AuthorizedPrincipalsFile none<br><br>#AuthorizedKeysCommand none<br>#AuthorizedKeysCommandUser nobody<br>:x<br><br>Merge conflict markers remain in: /etc/ssh/sshd_config<br>These must be resolved for the system to be functional.<br><br>Press Enter to return to editing this file, or type "ACCEPT" to carry on with<br>these lines remaining in the file.<br>ACCEPT<br><br><br>The following changes, which occurred between FreeBSD 14.3-RELEASE and<br>FreeBSD 15.0-RELEASE have been merged into /etc/login.conf:<br>--- current version<br>+++ new version<br>@@ -44,11 +44,10 @@<br> <span class="Apple-tab-span" style="white-space:pre"> </span>:pseudoterminals=unlimited:\<br> <span class="Apple-tab-span" style="white-space:pre"> </span>:kqueues=unlimited:\<br> <span class="Apple-tab-span" style="white-space:pre"> </span>:umtxp=unlimited:\<br> <span class="Apple-tab-span" style="white-space:pre"> </span>:pipebuf=unlimited:\<br> <span class="Apple-tab-span" style="white-space:pre"> </span>:priority=0:\<br>-<span class="Apple-tab-span" style="white-space:pre"> </span>:ignoretime@:\<br> <span class="Apple-tab-span" style="white-space:pre"> </span>:umask=022:\<br> <span class="Apple-tab-span" style="white-space:pre"> </span>:charset=UTF-8:\<br> <span class="Apple-tab-span" style="white-space:pre"> </span>:lang=C.UTF-8:<br><br> #<br>@@ -147,11 +146,10 @@<br> #<span class="Apple-tab-span" style="white-space:pre"> </span>:maxproc=32:\<br> #<span class="Apple-tab-span" style="white-space:pre"> </span>:priority=0:\<br> #<span class="Apple-tab-span" style="white-space:pre"> </span>:requirehome:\<br> #<span class="Apple-tab-span" style="white-space:pre"> </span>:passwordtime=90d:\<br> #<span class="Apple-tab-span" style="white-space:pre"> </span>:umask=002:\<br>-#<span class="Apple-tab-span" style="white-space:pre"> </span>:ignoretime@:\<br> #<span class="Apple-tab-span" style="white-space:pre"> </span>:tc=default:<br> #<br> #<br> ##<br> ## users of X (needs more resources!)<br>@@ -172,11 +170,10 @@<br> ##<br> ## Staff users - few restrictions and allow login anytime<br> ##<br> #staff:\<br> #<span class="Apple-tab-span" style="white-space:pre"> </span>:ignorenologin:\<br>-#<span class="Apple-tab-span" style="white-space:pre"> </span>:ignoretime:\<br> #<span class="Apple-tab-span" style="white-space:pre"> </span>:requirehome@:\<br> #<span class="Apple-tab-span" style="white-space:pre"> </span>:accounted@:\<br> #<span class="Apple-tab-span" style="white-space:pre"> </span>:path=~/bin /bin /sbin /usr/bin /usr/sbin /usr/local/bin /usr/local/sbin:\<br> #<span class="Apple-tab-span" style="white-space:pre"> </span>:umask=022:\<br> #<span class="Apple-tab-span" style="white-space:pre"> </span>:tc=standard:<br>@@ -263,11 +260,10 @@<br> ##<br> ## Site full-time 24/7 PPP connection<br> ## - no time accounting, restricted to access via dialin lines<br> ##<br> #site:\<br>-#<span class="Apple-tab-span" style="white-space:pre"> </span>:ignoretime:\<br> #<span class="Apple-tab-span" style="white-space:pre"> </span>:passwordtime@:\<br> #<span class="Apple-tab-span" style="white-space:pre"> </span>:refreshtime@:\<br> #<span class="Apple-tab-span" style="white-space:pre"> </span>:refreshperiod@:\<br> #<span class="Apple-tab-span" style="white-space:pre"> </span>:sessionlimit@:\<br> #<span class="Apple-tab-span" style="white-space:pre"> </span>:autodelete@:\<br>Does this look reasonable (y/n)? y <br><br>The following changes, which occurred between FreeBSD 14.3-RELEASE and<br>FreeBSD 15.0-RELEASE have been merged into /etc/ssh/sshd_config:<br>--- current version<br>+++ new version<br>@@ -1,6 +1,6 @@<br>-#<span class="Apple-tab-span" style="white-space:pre"> </span>$OpenBSD: sshd_config,v 1.104 2021/07/02 05:11:21 dtucker Exp $<br>+#<span class="Apple-tab-span" style="white-space:pre"> </span>$OpenBSD: sshd_config,v 1.105 2024/12/03 14:12:47 dtucker Exp $<br><br> # This is the sshd server system-wide configuration file. See<br> # sshd_config(5) for more information.<br><br> # This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin<br>@@ -55,15 +55,25 @@<br> # HostbasedAuthentication<br> #IgnoreUserKnownHosts no<br> # Don't read the user's ~/.rhosts and ~/.shosts files<br> #IgnoreRhosts yes<br><br>+<<<<<<< current version<br> # Change to yes to enable built-in password authentication.<br> PasswordAuthentication no<br> AuthenticationMethods publickey<br>+=======<br>+# Change to "yes" to enable built-in password authentication.<br>+# Note that passwords may also be accepted via KbdInteractiveAuthentication.<br>+#PasswordAuthentication no<br>+#PermitEmptyPasswords no<br>+>>>>>>> 15.0-RELEASE<br><br>-# Change to no to disable PAM authentication<br>+# Change to "no" to disable keyboard-interactive authentication. Depending on<br>+# the system's configuration, this may involve passwords, challenge-response,<br>+# one-time passwords or some combination of these and other methods.<br>+# Keyboard interactive authentication is also used for PAM authentication.<br> #KbdInteractiveAuthentication yes<br><br> # Kerberos options<br> #KerberosAuthentication no<br> #KerberosOrLocalPasswd yes<br>@@ -103,12 +113,12 @@<br> UseDNS no<br> #PidFile /var/run/sshd.pid<br> MaxStartups 10:30:100<br> PermitTunnel no<br> #ChrootDirectory none<br>-#UseBlacklist no<br>-#VersionAddendum FreeBSD-20250219<br>+#UseBlocklist no<br>+#VersionAddendum FreeBSD-20250801<br><br> # no default banner path<br> #Banner none<br><br> # override default of no subsystems<br>Does this look reasonable (y/n)? y<br><br>The following changes, which occurred between FreeBSD 14.3-RELEASE and<br>FreeBSD 15.0-RELEASE have been merged into /etc/ttys:<br>--- current version<br>+++ new version<br>@@ -1,8 +1,5 @@<br>-#<br>-#<span class="Apple-tab-span" style="white-space:pre"> </span>@(#)ttys<span class="Apple-tab-span" style="white-space:pre"> </span>5.1 (Berkeley) 4/17/89<br>-#<br> # This file specifies various information about terminals on the system.<br> # It is used by several different programs. Common entries for the<br> # various columns include:<br> #<br> # name The name of the terminal device.<br>Does this look reasonable (y/n)? y<br>The following files are affected by updates. No changes have<br>been downloaded, however, because the files have been modified<br>locally:<br>/etc/ssl/cert.pem<br>The following files will be removed as part of updating to<br>15.0-RELEASE-p0:<br>/.cshrc<br>/.profile<br>/boot/kernel/callout_test.ko<br>/boot/kernel/geom_bde.ko<br>/boot/kernel/geom_vinum.ko<br>/boot/kernel/iwm3160fw.ko<br>/boot/kernel/iwm3168fw.ko<br>/boot/kernel/iwm7260fw.ko<br>/boot/kernel/iwm7265Dfw.ko<br>/boot/kernel/iwm7265fw.ko<br>/boot/kernel/iwm8000Cfw.ko<br>/boot/kernel/iwm8265fw.ko<br>/boot/kernel/iwm9000fw.ko<br>/boot/kernel/iwm9260fw.ko<br>/boot/kernel/rtw8723d_fw.bin.ko<br>/boot/kernel/rtw8821c_fw.bin.ko<br>/boot/kernel/rtw8822b_fw.bin.ko<br>/boot/kernel/rtw8822c_fw.bin.ko<br>/boot/kernel/rtw8822c_wow_fw.bin.ko<br>/boot/zfsboot<br>/etc/ftpusers<br>/etc/gss/qop<br>/etc/newsyslog.conf.d/ftp.conf<br>/etc/rc.d/ftpd<br>/etc/rc.d/gbde<br>/etc/rc.d/ipropd_master<br>/etc/rc.d/ipropd_slave<br>/etc/rc.d/keyserv<br>/etc/rc.d/kfd<br>/etc/rc.d/kpasswdd<br>/etc/rc.d/opensm<br>/etc/syslog.d/ftp.conf<br>/lib/libcrypto.so.30<br>/lib/libmd.so.6<br>/lib/libufs.so.7<br>/lib/libutil.so.9<br>/rescue/gbde<br>/sbin/gbde<br>/sbin/gvinum<br>/usr/bin/asn1_compile<br>/usr/bin/chkey<br>/usr/bin/dialog<br>/usr/bin/dpv<br>/usr/bin/hxtool<br>/usr/bin/kcc<br>/usr/bin/keylogin<br>/usr/bin/keylogout<br>/usr/bin/kf<br>The following files will be added as part of updating to<br>15.0-RELEASE-p0:<br>/boot/firmware/iwm3160fw<br>/boot/firmware/iwm3168fw<br>/boot/firmware/iwm7260fw<br>/boot/firmware/iwm7265Dfw<br>/boot/firmware/iwm7265fw<br>/boot/firmware/iwm8000C<br>/boot/firmware/iwm8265fw<br>/boot/firmware/iwm9000fw<br>/boot/firmware/iwm9260fw<br>/boot/fonts/32x64.fnt.gz<br>/boot/images/freebsd-install-brand-rev.png<br>/boot/kernel/accf_tls.ko<br>/boot/kernel/acpi_sbl_wmi.ko<br>/boot/kernel/amdsmu.ko<br>/boot/kernel/dummymbuf.ko<br>/boot/kernel/e6000sw.ko<br>/boot/kernel/etherswitch.ko<br>/boot/kernel/hwt.ko<br>/boot/kernel/i2ctinyusb.ko<br>/boot/kernel/if_iwx.ko<br>/boot/kernel/if_mtw.ko<br>/boot/kernel/miiproxy.ko<br>/boot/kernel/nvmf.ko<br>/boot/kernel/nvmf_tcp.ko<br>/boot/kernel/nvmf_transport.ko<br>/boot/kernel/nvmft.ko<br>/boot/kernel/p9fs.ko<br>/boot/kernel/pflow.ko<br>/boot/kernel/pt.ko<br>/boot/kernel/rdseed_rng.ko<br>/boot/kernel/snd_hdsp.ko<br>/boot/kernel/t7fw_cfg.ko<br>/boot/kernel/u2f.ko<br>/boot/kernel/udbc.ko<br>/boot/kernel/ufshci.ko<br>/boot/kernel/umb.ko<br>/boot/kernel/virtio_p9fs.ko<br>/boot/kernel/wlan_gcmp.ko<br>/boot/kernel/wtap.ko<br>/boot/loader.help.kboot<br>/boot/loader.kboot<br>/boot/lua/gfx-install.lua<br>/etc/blocklistd.conf<br>/etc/devd/nvmf.conf<br>/etc/devd/snd.conf<br>/etc/dma/auth.conf<br>/etc/moused.conf<br>/etc/rc.d/blocklistd<br>The following files will be updated as part of updating to<br>15.0-RELEASE-p0:<br>/COPYRIGHT<br>/bin/[<br>/bin/cat<br>/bin/chflags<br>/bin/chio<br>/bin/chmod<br>/bin/cp<br>/bin/cpuset<br>/bin/csh<br>/bin/date<br>/bin/dd<br>/bin/df<br>/bin/domainname<br>/bin/echo<br>/bin/ed<br>/bin/expr<br>/bin/freebsd-version<br>/bin/getfacl<br>/bin/hostname<br>/bin/kenv<br>/bin/kill<br>/bin/link<br>/bin/ln<br>/bin/ls<br>/bin/mkdir<br>/bin/mv<br>/bin/nproc<br>/bin/pax<br>/bin/pgrep<br>/bin/pkill<br>/bin/ps<br>/bin/pwait<br>/bin/pwd<br>/bin/realpath<br>/bin/red<br>/bin/rm<br>/bin/rmail<br>/bin/rmdir<br>/bin/setfacl<br>/bin/sh<br>/bin/sleep<br>/bin/stty<br>/bin/sync<br>/bin/tcsh<br>/bin/test<br>/bin/timeout<br>/bin/unlink<br>/bin/uuidgen<br>To install the downloaded upgrades, run 'freebsd-update [options] install'.<br>[root@hero /usr/home/xan]# freebsd-update install <br>src component not installed, skipped<br>Installing updates...<br>Kernel updates have been installed. Please reboot and run<br>'freebsd-update [options] install' again to finish installing updates.<br>[root@hero /usr/home/xan]# reboot <br>Connection to hero closed by remote host.<br>Connection to hero closed.<br>[xan@coronari ~]$ ssh hero<br>ssh: connect to host hero port 22: No route to host<br>[xan@coronari ~]$ ssh hero<br>ssh: connect to host hero port 22: No route to host<br>[xan@coronari ~]$ ssh hero<br>ssh: connect to host hero port 22: Connection refused<br>[xan@coronari ~]$ ssh hero<br>ssh: connect to host hero port 22: Connection refused<br>[xan@coronari ~]$ ssh hero<br>ssh: connect to host hero port 22: Connection refused<br>[xan@coronari ~]$ ssh hero<br>ssh: connect to host hero port 22: Connection refused<br>[xan@coronari ~]$ ssh hero<br>ssh: connect to host hero port 22: Connection refused<br>[xan@coronari ~]$ ssh hero<br>ssh: connect to host hero port 22: Connection refused<br>[xan@coronari ~]$ ssh hero<br>ssh: connect to host hero port 22: Connection refused<br>[xan@coronari ~]$ ssh hero<br>ssh: connect to host hero port 22: Connection refused<br>[xan@coronari ~]$ ssh hero<br>ssh: connect to host hero port 22: Connection refused<br>[xan@coronari ~]$ ssh hero<br>ssh: connect to host hero port 22: Connection refused<br>[xan@coronari ~]$ ssh hero<br>ssh: connect to host hero port 22: Connection refused<br>[xan@coronari ~]$ ssh hero<br>ssh: connect to host hero port 22: Connection refused<br>[xan@coronari ~]$ ssh hero<br>ssh: connect to host hero port 22: Connection refused<br>[xan@coronari ~]$ ssh hero<br>ssh: connect to host hero port 22: Connection refused<br>[xan@coronari ~]$ ssh hero<br>ssh: connect to host hero port 22: Connection refused<br>[xan@coronari ~]$ ssh hero<br>ssh: connect to host hero port 22: Connection refused<br>[xan@coronari ~]$ ssh hero<br>ssh: connect to host hero port 22: Connection refused<br>[xan@coronari ~]$ ssh hero<br>ssh: connect to host hero port 22: Connection refused<br>[xan@coronari ~]$ ssh hero<br>ssh: connect to host hero port 22: Connection refused<br>[xan@coronari ~]$ ssh hero<br>ssh: connect to host hero port 22: Connection refused<br>[xan@coronari ~]$ ssh hero<br>ssh: connect to host hero port 22: Connection refused<br>[xan@coronari ~]$ ssh hero<br>ssh: connect to host hero port 22: Connection refused<br>[xan@coronari ~]$ ssh hero<br>ssh: connect to host hero port 22: Connection refused<br>[xan@coronari ~]$ ssh hero<br>ssh: connect to host hero port 22: Connection refused<br>[xan@coronari ~]$ ssh hero<br>ssh: connect to host hero port 22: Connection refused<br>[xan@coronari ~]$ ssh hero<br>ssh: connect to host hero port 22: Connection refused<br>[xan@coronari ~]$ ssh hero<br>ssh: connect to host hero port 22: Connection refused<br>[xan@coronari ~]$ ssh hero<br>ssh: connect to host hero port 22: Connection refused<br>[xan@coronari ~]$ ssh hero<br>ssh: connect to host hero port 22: Connection refused<br>[xan@coronari ~]$ ssh hero<br>ssh: connect to host hero port 22: Connection refused<br>[xan@coronari ~]$ ssh hero<br>ssh: connect to host hero port 22: Connection refused<br>[xan@coronari ~]$ ssh hero<br>ssh: connect to host hero port 22: Connection refused<br>[xan@coronari ~]$ ssh hero<br>ssh: connect to host hero port 22: Connection refused<br>[xan@coronari ~]$ ssh hero<br>ssh: connect to host hero port 22: Connection refused<br>[xan@coronari ~]$ ssh hero<br>ssh: connect to host hero port 22: Connection refused<br>[xan@coronari ~]$ ssh hero<br>ssh: connect to host hero port 22: Connection refused<br>[xan@coronari ~]$ ssh hero<br>ssh: connect to host hero port 22: Connection refused<br>[xan@coronari ~]$ ssh hero<br>ssh: connect to host hero port 22: Connection refused<br>[xan@coronari ~]$ ssh hero<br>ssh: connect to host hero port 22: Connection refused<br>[xan@coronari ~]$ ssh hero<br>ssh: connect to host hero port 22: Connection refused<br>[xan@coronari ~]$ ssh hero<br>ssh: connect to host hero port 22: Connection refused<br>[xan@coronari ~]$ ssh hero<br>ssh: connect to host hero port 22: Connection refused<br>[xan@coronari ~]$ ssh hero<br>ssh: connect to host hero port 22: Connection refused<br>[xan@coronari ~]$ ssh hero<br>Last login: Fri Dec 5 10:01:06 2025 from 192.168.1.141<br>[xan@hero ~]$ doas -s<br>Password:<br>[root@hero /usr/home/xan]# freebsd-update install<br>src component not installed, skipped<br>Installing updates...<br>Restarting sshd after upgrade<br>Performing sanity check on sshd configuration.<br>/etc/ssh/sshd_config: line 60: Bad configuration option: <<<<<<<<br>/etc/ssh/sshd_config: line 69: Bad configuration option: >>>>>>><br>/etc/ssh/sshd_config: terminating, 2 bad configuration options<br><br>Completing this upgrade requires removing old shared object files.<br>Please rebuild all installed 3rd party software (e.g., programs<br>installed from the ports tree) and then run<br>'freebsd-update [options] install' again to finish installing updates.<br>[root@hero /usr/home/xan]# freebsd-update install<br>pkg: Warning: Major OS version upgrade detected. Running "pkg bootstrap -f" recommended<br>src component not installed, skipped<br>Installing updates... done.<br>[root@hero /usr/home/xan]# pkg bootstrap -f<br>ld-elf.so.1: Shared object "libutil.so.9" not found, required by "pkg"<br>[root@hero /usr/home/xan]# pkg install ld-elf<br>ld-elf.so.1: Shared object "libutil.so.9" not found, required by "pkg"<br>[root@hero /usr/home/xan]# pkg bootstrap -f<br>ld-elf.so.1: Shared object "libutil.so.9" not found, required by "pkg"<br>[root@hero /usr/home/xan]# freebsd-update install<br>src component not installed, skipped<br>No updates are available to install.<br>Run 'freebsd-update [options] fetch' first.<br>[root@hero /usr/home/xan]# vim /etc/ssh/<br>moduli ssh_config ssh_host_ecdsa_key ssh_host_ecdsa_key.pub ssh_host_ed25519_key ssh_host_ed25519_key.pub ssh_host_rsa_key ssh_host_rsa_key.pub sshd_config<br>[root@hero /usr/home/xan]# vim /etc/ssh/sshd_config <br><br><br># Authentication:<br><br>AllowUsers xan isabel<br>LoginGraceTime 1m<br>PermitRootLogin no<br>StrictModes yes<br>MaxAuthTries 3<br>MaxSessions 3<br><br>PubkeyAuthentication yes<br><br># The default is to check both .ssh/authorized_keys and .ssh/authorized_keys2<br># but this is overridden so installations will only check .ssh/authorized_keys<br>AuthorizedKeysFile .ssh/authorized_keys<br><br>#AuthorizedPrincipalsFile none<br><br>#AuthorizedKeysCommand none<br>#AuthorizedKeysCommandUser nobody<br><br># For this to work you will also need host keys in /etc/ssh/ssh_known_hosts<br>#HostbasedAuthentication no<br># Change to yes if you don't trust ~/.ssh/known_hosts for<br># HostbasedAuthentication<br>#IgnoreUserKnownHosts no<br># Don't read the user's ~/.rhosts and ~/.shosts files<br>#IgnoreRhosts yes<br><br><<<<<<< current version<br># Change to yes to enable built-in password authentication.<br>PasswordAuthentication no<br>AuthenticationMethods publickey<br>=======<br># Change to "yes" to enable built-in password authentication.<br># Note that passwords may also be accepted via KbdInteractiveAuthentication.<br>#PasswordAuthentication no<br>#PermitEmptyPasswords no<br><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><blockquote type="cite">15.0-RELEASE<br></blockquote></blockquote></blockquote></blockquote></blockquote></blockquote></blockquote><br># Change to "no" to disable keyboard-interactive authentication. Depending on<br># the system's configuration, this may involve passwords, challenge-response,<br># one-time passwords or some combination of these and other methods.<br># Keyboard interactive authentication is also used for PAM authentication.<br>#KbdInteractiveAuthentication yes<br><br># Kerberos options<br>#KerberosAuthentication no<br>#KerberosOrLocalPasswd yes<br>#KerberosTicketCleanup yes<br>"/etc/ssh/sshd_config" 132L, 3788B 75,2 36%<br><br># $OpenBSD: sshd_config,v 1.105 2024/12/03 14:12:47 dtucker Exp $<br><br># This is the sshd server system-wide configuration file. See<br># $OpenBSD: sshd_config,v 1.105 2024/12/03 14:12:47 dtucker Exp $<br><br># This is the sshd server system-wide configuration file. See<br># sshd_config(5) for more information.<br><br># This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin<br><br># The strategy used for options in the default sshd_config shipped with<br># OpenSSH is to specify options with their default value where<br># possible, but leave them commented. Uncommented options override the<br># default value.<br><br># Note that some of FreeBSD's defaults differ from OpenBSD's, and<br># FreeBSD has a few additional options.<br><br>#Port 22<br>#AddressFamily any<br>#ListenAddress 0.0.0.0<br>#ListenAddress ::<br><br>#HostKey /etc/ssh/ssh_host_rsa_key<br>#HostKey /etc/ssh/ssh_host_ecdsa_key<br>HostKey /etc/ssh/ssh_host_ed25519_key<br><br># Ciphers and keying<br>#RekeyLimit default none<br><br># Logging<br>#SyslogFacility AUTH<br>#LogLevel INFO<br><br># Authentication:<br><br>AllowUsers xan isabel<br>LoginGraceTime 1m<br>PermitRootLogin no<br>StrictModes yes<br>MaxAuthTries 3<br>MaxSessions 3<br><br>PubkeyAuthentication yes<br><br># The default is to check both .ssh/authorized_keys and .ssh/authorized_keys2<br># but this is overridden so installations will only check .ssh/authorized_keys<br>AuthorizedKeysFile .ssh/authorized_keys<br><br>#AuthorizedPrincipalsFile none<br><br>#AuthorizedKeysCommand none<br>#AuthorizedKeysCommandUser nobody<br><br># For this to work you will also need host keys in /etc/ssh/ssh_known_hosts<br>#HostbasedAuthentication no<br># Change to yes if you don't trust ~/.ssh/known_hosts for<br># HostbasedAuthentication<br>#IgnoreUserKnownHosts no<br># Don't read the user's ~/.rhosts and ~/.shosts files<br>#IgnoreRhosts yes<br><br># Change to yes to enable built-in password authentication.<br>PasswordAuthentication no<br>AuthenticationMethods publickey<br># Change to "yes" to enable built-in password authentication.<br># Note that passwords may also be accepted via KbdInteractiveAuthentication.<br>#PasswordAuthentication no<br>#PermitEmptyPasswords no<br><br># Change to "no" to disable keyboard-interactive authentication. Depending on<br># the system's configuration, this may involve passwords, challenge-response,<br># one-time passwords or some combination of these and other methods.<br># Keyboard interactive authentication is also used for PAM authentication.<br>#KbdInteractiveAuthentication yes<br><br># Kerberos options<br>#KerberosAuthentication no<br>#KerberosOrLocalPasswd yes<br>#KerberosTicketCleanup yes<br>#KerberosGetAFSToken no<br><br># GSSAPI options<br>#GSSAPIAuthentication no<br>#GSSAPICleanupCredentials yes<br><br># Set this to 'no' to disable PAM authentication, account processing,<br># and session processing. If this is enabled, PAM authentication will<br># be allowed through the KbdInteractiveAuthentication and<br># PasswordAuthentication. Depending on your PAM configuration,<br># PAM authentication via KbdInteractiveAuthentication may bypass<br># the setting of "PermitRootLogin prohibit-password".<br># If you just want the PAM account and session checks to run without<br># PAM authentication, then enable this but set PasswordAuthentication<br> 81,1 51%<br># If you just want the PAM account and session checks to run without<br># PAM authentication, then enable this but set PasswordAuthentication<br># and ChallengeResponseAuthentication to 'no'.<br>UsePAM yes<br># and KbdInteractiveAuthentication to 'no'.<br><br>#AllowAgentForwarding yes<br>#AllowTcpForwarding yes<br>GatewayPorts no<br>X11Forwarding no<br>#X11DisplayOffset 10<br>#X11UseLocalhost yes<br>#PermitTTY yes<br>PrintMotd no<br>#PrintLastLog yes<br>TCPKeepAlive yes<br>PermitUserEnvironment no<br>Compression yes<br>ClientAliveInterval 30<br>ClientAliveCountMax 3<br>UseDNS no<br>#PidFile /var/run/sshd.pid<br>MaxStartups 10:30:100<br>PermitTunnel no<br>#ChrootDirectory none<br>#UseBlocklist no<br>#VersionAddendum FreeBSD-20250801<br><br># no default banner path<br>#Banner none<br><br># override default of no subsystems<br>Subsystem sftp /usr/libexec/sftp-server<br><br># Example of overriding settings on a per-user basis<br>#Match User anoncvs<br># X11Forwarding no<br># AllowTcpForwarding no<br># PermitTTY no<br># ForceCommand cvs server<br>~ <br>~ <br>~ <br>~ <br>~ <br>~ <br>~ <br>~ <br>~ <br>~ <br>~ <br>~ <br>~ <br>~ <br>~ <br>~ <br>~ <br>~ <br>~ <br>~ <br>~ <br>~ <br>~ <br>~ <br>~ <br>~ <br>~ <br>~ <br>~ <br>~ <br>~ <br>~ <br>~ <br>~ <br>~ <br>~ <br>~ <br>~ <br>~ <br>~ <br>~ <br>~ <br>~ <br>~ <br>~ <br>~ <br>~ <br>~ <br>~ <br>"/etc/ssh/sshd_config" 129L, 3735B written<br>[root@hero /usr/home/xan]# reboot <br>Read from remote host hero: Connection reset by peer<br>Connection to hero closed.<br>client_loop: send disconnect: Broken pipe<br>[xan@coronari ~]$ ssh hero<br>ssh: connect to host hero port 22: No route to host<br>[xan@coronari ~]$ ssh hero<br>Last login: Fri Dec 5 10:16:38 2025 from 192.168.1.141<br>[xan@hero ~]$ doas -s<br>ld-elf.so.1: Shared object "libutil.so.9" not found, required by "doas"<br>[xan@hero ~]$ <br><br><br><br></div></div></blockquote></div><br></div></div></body></html>help
Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?2942849E-77D3-4053-8D5E-58FE9C0C6EE1>
