From nobody Fri Jan 12 16:27:15 2024 X-Original-To: freebsd-arm@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4TBRl60sH1z576xT for ; Fri, 12 Jan 2024 16:27:14 +0000 (UTC) (envelope-from fbsd@www.zefox.net) Received: from www.zefox.net (www.zefox.net [50.1.20.27]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "www.zefox.com", Issuer "www.zefox.com" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 4TBRl550NQz4Stw for ; Fri, 12 Jan 2024 16:27:13 +0000 (UTC) (envelope-from fbsd@www.zefox.net) Authentication-Results: mx1.freebsd.org; none Received: from www.zefox.net (localhost [127.0.0.1]) by www.zefox.net (8.17.1/8.15.2) with ESMTPS id 40CGRFYr016550 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NO); Fri, 12 Jan 2024 08:27:15 -0800 (PST) (envelope-from fbsd@www.zefox.net) Received: (from fbsd@localhost) by www.zefox.net (8.17.1/8.15.2/Submit) id 40CGRFnA016549; Fri, 12 Jan 2024 08:27:15 -0800 (PST) (envelope-from fbsd) Date: Fri, 12 Jan 2024 08:27:15 -0800 From: bob prohaska To: Mark Millard Cc: freebsd-arm@freebsd.org Subject: Re: USB-serial adapter suggestions needed Message-ID: References: <3012A549-9482-4D69-9DF4-7987E650DFFA@yahoo.com> <55AC6824-587D-4C67-B64B-2045A1112F69@yahoo.com> <041F74B4-3D44-4364-9EBD-9F21A4F3B313@yahoo.com> <902798B1-2B66-4ECD-BDAC-195C85066FE6@yahoo.com> <8B4C76B2-707E-4978-9CB3-5D547303A7E5@yahoo.com> List-Id: Porting FreeBSD to ARM processors List-Archive: https://lists.freebsd.org/archives/freebsd-arm List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-arm@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <8B4C76B2-707E-4978-9CB3-5D547303A7E5@yahoo.com> X-Rspamd-Queue-Id: 4TBRl550NQz4Stw X-Spamd-Bar: ---- X-Rspamd-Pre-Result: action=no action; module=replies; Message is reply to one we originated X-Spamd-Result: default: False [-4.00 / 15.00]; REPLY(-4.00)[]; ASN(0.00)[asn:7065, ipnet:50.1.16.0/20, country:US] On Thu, Jan 11, 2024 at 02:51:47PM -0800, Mark Millard wrote: > >>> > >>> But there is no information here about which of those was the > >>> one to start the failure on nemesis.zefox.com : > >>> > >>> A) Was it the tip process? > >>> B) Was it the shell process? > >>> C) Was it the nemesis.zefox.com side of the ssh? It turns out that killing tip (using killall on the terminal server) does not disturb the ssh session. Both the ssh connection from workstation to terminal server and the su to root needed to run tip survive. I should apologize for not testing this sooner, it was a very easy experiment. If you think of useful variations please indicate them. The "invalid characters in banner" message still intrigue me. Might it be possible for output from tip to ssh inadvertently contain a ~. sequence in a direction that makes ssh or sshd disconnect? It does appear that what looks like console-to-terminal-server traffic is sometimes reflected back to the console as input, but only when tip is being started and not every time at that. Some help from the comp.sys.raspberry-pi newsgroup suggested trying journalctl -u ssh on the RPiOS workstation. It reports ssh server activity, essentially sshd startups at boot, but not client activity. I'll keep looking. Thanks for reading, and all your help! bob prohaska