[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Connection closed by 10.128.0.2 since update from woody to sarge



Hello!

I've got a problem with ssh on a debian-sarge-system and I really don't know where to look further.

The situation is as follows:
I've got a sarge system hosting some user-mode-linux environments running woody which I want to upgrade to sarge.

The upgrade went fine but afterward's I wasn't able to login via ssh anymore and I get this "Connection closed by [ip]" error message.
(also when trying to ssh to localhost from the machine itself)

ssh with public-key authentication works.

I used the same self-build uml-kernel (2.6.10) as with the woody-system.
I started debuging on client and server side (see attached files) but I can't figure out, where the error lies since I can't see any error-messages on the server or on the client at all. I think it has something to do with pam because the debug-log stops just after the sshpam_query, or somehow with terminals but I cant figure out what. The thing is that when I deploy this filesystem to a real harddisk an boot it I can login without problems, but not inside uml.

ssh-version used is: 3.8.1p1-8.sarge.4
kernel used: 2.6.10

I hope that somebody can help me.

Greets
Patrick

Feb 10 07:59:08 atlantis sshd[442]: Connection from 10.128.0.1 port 32870
Feb 10 07:59:08 atlantis sshd[420]: debug1: Forked child 442.
Feb 10 07:59:08 atlantis sshd[442]: debug1: Client protocol version 2.0; client software version OpenSSH_3.8.1p1 Debian-8.sarge.4
Feb 10 07:59:08 atlantis sshd[442]: debug1: match: OpenSSH_3.8.1p1 Debian-8.sarge.4 pat OpenSSH*
Feb 10 07:59:08 atlantis sshd[442]: debug1: Enabling compatibility mode for protocol 2.0
Feb 10 07:59:08 atlantis sshd[442]: debug1: Local version string SSH-2.0-OpenSSH_3.8.1p1 Debian-8.sarge.4
Feb 10 07:59:08 atlantis sshd[442]: debug2: Network child is on pid 443
Feb 10 07:59:08 atlantis sshd[442]: debug3: preauth child monitor started
Feb 10 07:59:08 atlantis sshd[442]: debug3: mm_request_receive entering
Feb 10 07:59:08 atlantis sshd[442]: debug3: monitor_read: checking request 0
Feb 10 07:59:08 atlantis sshd[442]: debug3: mm_answer_moduli: got parameters: 1024 1024 8192
Feb 10 07:59:08 atlantis sshd[442]: debug3: mm_request_send entering: type 1
Feb 10 07:59:08 atlantis sshd[442]: debug2: monitor_read: 0 used once, disabling now
Feb 10 07:59:08 atlantis sshd[442]: debug3: mm_request_receive entering
Feb 10 07:59:08 atlantis sshd[442]: debug3: monitor_read: checking request 4
Feb 10 07:59:08 atlantis sshd[442]: debug3: mm_answer_sign
Feb 10 07:59:08 atlantis sshd[442]: debug3: mm_answer_sign: signature 0x809d4e0(143)
Feb 10 07:59:08 atlantis sshd[442]: debug3: mm_request_send entering: type 5
Feb 10 07:59:08 atlantis sshd[442]: debug2: monitor_read: 4 used once, disabling now
Feb 10 07:59:08 atlantis sshd[442]: debug3: mm_request_receive entering
Feb 10 07:59:08 atlantis sshd[442]: debug3: monitor_read: checking request 6
Feb 10 07:59:08 atlantis sshd[442]: debug3: mm_answer_pwnamallow
Feb 10 07:59:08 atlantis sshd[442]: debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1
Feb 10 07:59:08 atlantis sshd[442]: debug3: mm_request_send entering: type 7
Feb 10 07:59:08 atlantis sshd[442]: debug2: monitor_read: 6 used once, disabling now
Feb 10 07:59:08 atlantis sshd[442]: debug3: mm_request_receive entering
Feb 10 07:59:08 atlantis sshd[442]: debug3: monitor_read: checking request 45
Feb 10 07:59:08 atlantis sshd[442]: debug1: PAM: initializing for "root"
Feb 10 07:59:08 atlantis sshd[442]: debug3: Trying to reverse map address 10.128.0.1.
Feb 10 07:59:08 atlantis sshd[442]: debug1: PAM: setting PAM_RHOST to "atlantis.home"
Feb 10 07:59:08 atlantis sshd[442]: debug1: PAM: setting PAM_TTY to "ssh"
Feb 10 07:59:08 atlantis sshd[442]: debug2: monitor_read: 45 used once, disabling now
Feb 10 07:59:08 atlantis sshd[442]: debug3: mm_request_receive entering
Feb 10 07:59:08 atlantis sshd[442]: debug3: monitor_read: checking request 3
Feb 10 07:59:08 atlantis sshd[442]: debug3: mm_answer_authserv: service=ssh-connection, style=
Feb 10 07:59:08 atlantis sshd[442]: debug2: monitor_read: 3 used once, disabling now
Feb 10 07:59:08 atlantis sshd[442]: debug3: mm_request_receive entering
Feb 10 07:59:08 atlantis sshd[442]: debug3: monitor_read: checking request 20
Feb 10 07:59:09 atlantis sshd[442]: debug3: mm_answer_keyallowed entering
Feb 10 07:59:09 atlantis sshd[442]: debug3: mm_answer_keyallowed: key_from_blob: 0x809f6e0
Feb 10 07:59:09 atlantis sshd[442]: debug1: temporarily_use_uid: 0/0 (e=0/0)
Feb 10 07:59:09 atlantis sshd[442]: debug1: trying public key file /root/.ssh/authorized_keys
Feb 10 07:59:09 atlantis sshd[442]: debug1: restore_uid: 0/0
Feb 10 07:59:09 atlantis sshd[442]: debug1: temporarily_use_uid: 0/0 (e=0/0)
Feb 10 07:59:09 atlantis sshd[442]: debug1: trying public key file /root/.ssh/authorized_keys2
Feb 10 07:59:09 atlantis sshd[442]: debug1: restore_uid: 0/0
Feb 10 07:59:09 atlantis sshd[442]: debug3: mm_answer_keyallowed: key 0x809f6e0 is disallowed
Feb 10 07:59:09 atlantis sshd[442]: debug3: mm_request_send entering: type 21
Feb 10 07:59:09 atlantis sshd[442]: debug3: mm_request_receive entering
Feb 10 07:59:09 atlantis sshd[442]: debug3: monitor_read: checking request 48
Feb 10 07:59:09 atlantis sshd[442]: debug3: mm_answer_pam_init_ctx
Feb 10 07:59:09 atlantis sshd[442]: debug3: PAM: sshpam_init_ctx entering
Feb 10 07:59:09 atlantis sshd[442]: debug3: mm_request_send entering: type 49
Feb 10 07:59:09 atlantis sshd[442]: debug3: mm_request_receive entering
Feb 10 07:59:09 atlantis sshd[442]: debug3: monitor_read: checking request 50
Feb 10 07:59:09 atlantis sshd[442]: debug3: mm_answer_pam_query
Feb 10 07:59:09 atlantis sshd[442]: debug3: PAM: sshpam_query entering

atlantis uml # ssh -vvv 10.128.0.2
OpenSSH_3.8.1p1 Debian-8.sarge.4, OpenSSL 0.9.7e 25 Oct 2004
debug1: Reading configuration data /etc/ssh/ssh_config
debug2: ssh_connect: needpriv 0
debug1: Connecting to 10.128.0.2 [10.128.0.2] port 22.
debug1: Connection established.
debug1: identity file /root/.ssh/identity type -1
debug1: identity file /root/.ssh/id_rsa type -1
debug3: Not a RSA1 key file /root/.ssh/id_dsa.
debug2: key_type_from_name: unknown key type '-----BEGIN'
debug3: key_read: missing keytype
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug2: key_type_from_name: unknown key type '-----END'
debug3: key_read: missing keytype
debug1: identity file /root/.ssh/id_dsa type 2
debug1: Remote protocol version 2.0, remote software version OpenSSH_3.8.1p1 Debian-8.sarge.4
debug1: match: OpenSSH_3.8.1p1 Debian-8.sarge.4 pat OpenSSH*
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_3.8.1p1 Debian-8.sarge.4
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2: mac_init: found hmac-md5
debug1: kex: server->client aes128-cbc hmac-md5 none
debug2: mac_init: found hmac-md5
debug1: kex: client->server aes128-cbc hmac-md5 none
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
debug2: dh_gen_key: priv key bits set: 133/256
debug2: bits set: 501/1024
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
debug3: check_host_in_hostfile: filename /root/.ssh/known_hosts
debug3: check_host_in_hostfile: match line 27
debug1: Host '10.128.0.2' is known and matches the RSA host key.
debug1: Found key in /root/.ssh/known_hosts:27
debug2: bits set: 500/1024
debug1: ssh_rsa_verify: signature correct
debug2: kex_derive_keys
debug2: set_newkeys: mode 1
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug2: set_newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: SSH2_MSG_SERVICE_REQUEST sent
debug2: service_accept: ssh-userauth
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug2: key: /root/.ssh/identity ((nil))
debug2: key: /root/.ssh/id_rsa ((nil))
debug2: key: /root/.ssh/id_dsa (0x808c4e0)
debug1: Authentications that can continue: publickey,keyboard-interactive
debug3: start over, passed a different list publickey,keyboard-interactive
debug3: preferred publickey,keyboard-interactive,password
debug3: authmethod_lookup publickey
debug3: remaining preferred: keyboard-interactive,password
debug3: authmethod_is_enabled publickey
debug1: Next authentication method: publickey
debug1: Trying private key: /root/.ssh/identity
debug3: no such identity: /root/.ssh/identity
debug1: Trying private key: /root/.ssh/id_rsa
debug3: no such identity: /root/.ssh/id_rsa
debug1: Offering public key: /root/.ssh/id_dsa
debug3: send_pubkey_test
debug2: we sent a publickey packet, wait for reply
debug1: Authentications that can continue: publickey,keyboard-interactive
debug2: we did not send a packet, disable method
debug3: authmethod_lookup keyboard-interactive
debug3: remaining preferred: password
debug3: authmethod_is_enabled keyboard-interactive
debug1: Next authentication method: keyboard-interactive
debug2: userauth_kbdint
debug2: we sent a keyboard-interactive packet, wait for reply
Connection closed by 10.128.0.2



Reply to: