[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#257514: marked as done (ssh: even more info)



Your message dated Sat, 10 Jul 2004 09:32:03 -0400
with message-id <E1BjHxT-0004qi-00@newraff.debian.org>
and subject line Bug#252676: fixed in openssh 1:3.8.1p1-5
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 3 Jul 2004 23:47:29 +0000
>From dilinger@voxel.net Sat Jul 03 16:47:29 2004
Return-path: <dilinger@voxel.net>
Received: from hq.voxel.net (toaster.hq.voxel.net) [66.109.37.2] 
	by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
	id 1BguED-0006K2-00; Sat, 03 Jul 2004 16:47:29 -0700
Received: by toaster.hq.voxel.net (Postfix, from userid 1000)
	id AB9222F4114; Sat,  3 Jul 2004 19:48:24 -0400 (EDT)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Andres Salomon <dilinger@voxel.net>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: ssh: even more info
X-Mailer: reportbug 2.62
Date: Sat, 03 Jul 2004 19:48:24 -0400
Message-Id: <20040703234824.AB9222F4114@toaster.hq.voxel.net>
Delivered-To: submit@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.1 required=4.0 tests=BAYES_00,HAS_PACKAGE,
	REMOVE_REMOVAL_2WORD autolearn=no 
	version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level: 

Package: ssh
Version: 1:3.8p1-3
Severity: normal
Followup-For: Bug #252676

The bug was (finally) triggered again.  Here's what it looks like:


dilinger@toaster:~/src$ ssh -vvv sloth
OpenSSH_3.8.1p1 Debian 1:3.8.1p1-4, OpenSSL 0.9.7d 17 Mar 2004
debug1: Reading configuration data /etc/ssh/ssh_config
debug2: ssh_connect: needpriv 0
debug1: Connecting to sloth [69.9.160.254] port 22.
debug1: Connection established.
debug1: identity file /home/dilinger/.ssh/identity type -1
debug1: identity file /home/dilinger/.ssh/id_rsa type -1
debug1: identity file /home/dilinger/.ssh/id_dsa type -1
ssh_exchange_identification: Connection closed by remote host

Nothing shows up in any of my logs (not even an "sshd: connected
from..").

Here's an strace of the sshd process listening on port 22:
Process 29872 attached - interrupt to quit
select(15, [3 5 6 7 8 9 10 11 12 13 14], NULL, NULL, NULL) = 1 (in [3])
accept(3, {sa_family=AF_INET, sin_port=htons(51083),
sin_addr=inet_addr("66.109.37.2")}, [16]) = 4
fcntl64(4, F_SETFL, O_RDONLY)           = 0
close(4)                                = 0
select(15, [3 5 6 7 8 9 10 11 12 13 14], NULL, NULL, NULL <unfinished
...>
Process 29872 detached

(which looks fine to me..)

Here's the ltrace (w/ debugging turned on):

DEBUG: elf.c:44: do_init_elf(): Reading ELF from /proc/29872/exe...
DEBUG: breakpoints.c:85: enable_all_breakpoints(): Enabling breakpoints
for pid 29872...
DEBUG: process_event.c:70: process_event(): event: none
DEBUG: process_event.c:85: process_event(): event: syscall
(SYS__newselect [142])
DEBUG: process_event.c:89: process_event(): event: sysret
(SYS__newselect [142])DEBUG: process_event.c:85: process_event(): event:
syscall (SYS_socketcall [102])
DEBUG: process_event.c:89: process_event(): event: sysret
(SYS_socketcall [102])DEBUG: process_event.c:85: process_event(): event:
syscall (SYS_fcntl64 [221])
DEBUG: process_event.c:89: process_event(): event: sysret (SYS_fcntl64
[221])
DEBUG: process_event.c:85: process_event(): event: syscall (SYS_close
[6])
DEBUG: process_event.c:89: process_event(): event: sysret (SYS_close
[6])
DEBUG: process_event.c:85: process_event(): event: syscall
(SYS__newselect [142])
DEBUG: ltrace.c:56: signal_exit(): Received interrupt signal; exiting...
DEBUG: process_event.c:89: process_event(): event: sysret
(SYS__newselect [142])DEBUG: process_event.c:73: process_event(): event:
signal (SIGSTOP [19])
DEBUG: breakpoints.c:103: disable_all_breakpoints(): Disabling
breakpoints for pid 29872...
DEBUG: process_event.c:135: remove_proc(): Removing pid 29872


The only thing that looks different in its /proc/<pid>/maps is
40046000-4012e000 r-xp 00000000 21:03 2315780
/usr/lib/i686/cmov/libcrypto.so.0.9.7.dpkg-new (deleted)
4012e000-4013f000 rw-p 000e8000 21:03 2315780
/usr/lib/i686/cmov/libcrypto.so.0.9.7.dpkg-new (deleted)


I added a bunch of debug/audit stuff to pam auth files, but it doesn't
seem to affect sshd; I suspect I'll need to HUP/restart it (and I won't
be able to trigger the bug again).  So, if you have any suggestions for
further debugging, let me know.  Otherwise, I'll probably have to
restart ssh sometime within the next few days.



-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.4.24-grsec+mremap
Locale: LANG=C, LC_CTYPE=C

Versions of packages ssh depends on:
ii  adduser                     3.53         Add and remove users and
groups
ii  debconf                     1.4.25       Debian configuration
management sy
ii  dpkg                        1.10.21      Package maintenance system
for Deb
ii  libc6                       2.3.2.ds1-12 GNU C Library: Shared
libraries an
ii  libpam-modules              0.76-21      Pluggable Authentication
Modules f
ii  libpam-runtime              0.76-21      Runtime support for the PAM
librar
ii  libpam0g                    0.76-21      Pluggable Authentication
Modules l
ii  libssl0.9.7                 0.9.7d-3     SSL shared libraries
ii  libwrap0                    7.6.dbs-3    Wietse Venema's TCP
wrappers libra
ii  zlib1g                      1:1.2.1-5    compression library -
runtime

-- debconf information:
* ssh/privsep_tell: 
  ssh/insecure_rshd: 
  ssh/privsep_ask: true
  ssh/ssh2_keys_merged: 
* ssh/user_environment_tell: 
* ssh/forward_warning: 
  ssh/insecure_telnetd: 
  ssh/new_config: true
* ssh/use_old_init_script: true
* ssh/protocol2_only: true
  ssh/encrypted_host_key_but_no_keygen: 
* ssh/run_sshd: true
* ssh/SUID_client: true

---------------------------------------
Received: (at 252676-close) by bugs.debian.org; 10 Jul 2004 13:38:02 +0000
>From katie@ftp-master.debian.org Sat Jul 10 06:38:02 2004
Return-path: <katie@ftp-master.debian.org>
Received: from newraff.debian.org [208.185.25.31] (mail)
	by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
	id 1BjI3G-0007HH-00; Sat, 10 Jul 2004 06:38:02 -0700
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
	id 1BjHxT-0004qi-00; Sat, 10 Jul 2004 09:32:03 -0400
From: Colin Watson <cjwatson@debian.org>
To: 252676-close@bugs.debian.org
X-Katie: $Revision: 1.51 $
Subject: Bug#252676: fixed in openssh 1:3.8.1p1-5
Message-Id: <E1BjHxT-0004qi-00@newraff.debian.org>
Sender: Archive Administrator <katie@ftp-master.debian.org>
Date: Sat, 10 Jul 2004 09:32:03 -0400
Delivered-To: 252676-close@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
	autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level: 
X-CrossAssassin-Score: 2

Source: openssh
Source-Version: 1:3.8.1p1-5

We believe that the bug you reported is fixed in the latest version of
openssh, which is due to be installed in the Debian FTP archive:

openssh-client-udeb_3.8.1p1-5_powerpc.udeb
  to pool/main/o/openssh/openssh-client-udeb_3.8.1p1-5_powerpc.udeb
openssh-server-udeb_3.8.1p1-5_powerpc.udeb
  to pool/main/o/openssh/openssh-server-udeb_3.8.1p1-5_powerpc.udeb
openssh_3.8.1p1-5.diff.gz
  to pool/main/o/openssh/openssh_3.8.1p1-5.diff.gz
openssh_3.8.1p1-5.dsc
  to pool/main/o/openssh/openssh_3.8.1p1-5.dsc
ssh-askpass-gnome_3.8.1p1-5_powerpc.deb
  to pool/main/o/openssh/ssh-askpass-gnome_3.8.1p1-5_powerpc.deb
ssh_3.8.1p1-5_powerpc.deb
  to pool/main/o/openssh/ssh_3.8.1p1-5_powerpc.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 252676@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Colin Watson <cjwatson@debian.org> (supplier of updated openssh package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Sat, 10 Jul 2004 13:57:27 +0100
Source: openssh
Binary: ssh-askpass-gnome openssh-client-udeb ssh openssh-server-udeb
Architecture: source powerpc
Version: 1:3.8.1p1-5
Distribution: unstable
Urgency: medium
Maintainer: Matthew Vernon <matthew@debian.org>
Changed-By: Colin Watson <cjwatson@debian.org>
Description: 
 openssh-client-udeb - Secure shell client for the Debian installer (udeb)
 openssh-server-udeb - Secure shell server for the Debian installer (udeb)
 ssh        - Secure rlogin/rsh/rcp replacement (OpenSSH)
 ssh-askpass-gnome - under X, asks user for a passphrase for ssh-add
Closes: 252226 252676 258517
Changes: 
 openssh (1:3.8.1p1-5) unstable; urgency=medium
 .
   * Update German debconf template translation (thanks, Helge Kreutzmann;
     closes: #252226).
   * Remove Suggests: dnsutils, as it was only needed for
     make-ssh-known-hosts (#93265), which has been replaced by ssh-keyscan.
   * Disable shadow password support in openssh-server-udeb.
   * Fix non-portable shell constructs in maintainer scripts, Makefile, and
     ssh-copy-id (thanks, David Weinehall; closes: #258517).
   * Apply patch from Darren Tucker to make the PAM authentication SIGCHLD
     handler kill the PAM thread if its waitpid() call returns 0, as well as
     the previous check for -1 (closes: #252676).
   * Add scp and sftp to openssh-client-udeb. It might not be very 'u' any
     more; oh well.
Files: 
 3202977c5bb0f8ad90f054490c897ee8 890 net standard openssh_3.8.1p1-5.dsc
 c1607db15c5c218a105ebeb283987c16 148208 net standard openssh_3.8.1p1-5.diff.gz
 7fd850f6eaa00a94bc20bd08bd47365f 732184 net standard ssh_3.8.1p1-5_powerpc.deb
 bcccadd0ae2ccdf5e392fdc0857c6440 51878 gnome optional ssh-askpass-gnome_3.8.1p1-5_powerpc.deb
 e7f35854be7a14906d2c003a881a979e 150892 debian-installer optional openssh-client-udeb_3.8.1p1-5_powerpc.udeb
 afbc62f360b4ea7fea4586cc4b46e369 159546 debian-installer optional openssh-server-udeb_3.8.1p1-5_powerpc.udeb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)
Comment: Colin Watson <cjwatson@debian.org> -- Debian developer

iD8DBQFA7+vC9t0zAhD6TNERAhpDAJ9MSjipj7CkcZ9KklG7dONVYCSvIwCfRijl
MuXejNOZ9aZhR/N5QWQL4Fg=
=V8cq
-----END PGP SIGNATURE-----




Reply to: