[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#292880: sshd is unable to do X-forwarding with Kernel 2.6



Am Sonntag 30 Januar 2005 21:37 schrieb Konstantin Seiler:
> Package: ssh
> Version: 1:3.8.1p1-8.sarge.4
> Severity: important
>
>
> When upgrading from a 2.4-Kernel to 2.6, sshd is unable to handle
> X-forwarding.
>
> Debug-Output of sshd follows:
>
> Restarting OpenBSD Secure Shell server: sshddebug1: sshd version
> OpenSSH_3.8.1p1 Debian-8.sarge.4 debug1: private host key: #0 type 0 RSA1
> debug1: read PEM private key done: type RSA
> debug1: private host key: #1 type 1 RSA
> debug1: read PEM private key done: type DSA
> debug1: private host key: #2 type 2 DSA
> socket: Address family not supported by protocol
> debug1: Bind to port 22 on 0.0.0.0.
> Server listening on 0.0.0.0 port 22.
> debug1: Server will not fork when running in debugging mode.
> Connection from 132.230.75.74 port 55348
> debug1: Client protocol version 2.0; client software version
> OpenSSH_3.8.1p1 Debian-8.sarge.4 debug1: match: OpenSSH_3.8.1p1
> Debian-8.sarge.4 pat OpenSSH*
> debug1: Enabling compatibility mode for protocol 2.0
> debug1: Local version string SSH-2.0-OpenSSH_3.8.1p1 Debian-8.sarge.4
> debug1: list_hostkey_types: ssh-rsa,ssh-dss
> debug1: SSH2_MSG_KEXINIT sent
> debug1: SSH2_MSG_KEXINIT received
> debug1: kex: client->server aes128-cbc hmac-md5 none
> debug1: kex: server->client aes128-cbc hmac-md5 none
> debug1: SSH2_MSG_KEX_DH_GEX_REQUEST received
> debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent
> debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT
> debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent
> debug1: SSH2_MSG_NEWKEYS sent
> debug1: expecting SSH2_MSG_NEWKEYS
> debug1: SSH2_MSG_NEWKEYS received
> debug1: KEX done
> debug1: userauth-request for user kaymes service ssh-connection method none
> debug1: attempt 0 failures 0
> debug1: PAM: initializing for "kaymes"
> debug1: PAM: setting PAM_RHOST to "lanai.physik.uni-freiburg.de"
> debug1: PAM: setting PAM_TTY to "ssh"
> Failed none for kaymes from 132.230.75.74 port 55348 ssh2
> debug1: userauth-request for user kaymes service ssh-connection method
> publickey debug1: attempt 1 failures 1
> debug1: test whether pkalg/pkblob are acceptable
> debug1: temporarily_use_uid: 1014/1014 (e=0/0)
> debug1: trying public key file /home/kaymes/.ssh/authorized_keys
> debug1: matching key found: file /home/kaymes/.ssh/authorized_keys, line 1
> Found matching RSA key: bf:41:0b:52:e0:72:ec:f7:62:e2:c1:e1:2d:04:b1:87
> debug1: restore_uid: 0/0
> Postponed publickey for kaymes from 132.230.75.74 port 55348 ssh2
> debug1: userauth-request for user kaymes service ssh-connection method
> publickey debug1: attempt 2 failures 1
> debug1: temporarily_use_uid: 1014/1014 (e=0/0)
> debug1: trying public key file /home/kaymes/.ssh/authorized_keys
> debug1: matching key found: file /home/kaymes/.ssh/authorized_keys, line 1
> Found matching RSA key: bf:41:0b:52:e0:72:ec:f7:62:e2:c1:e1:2d:04:b1:87
> debug1: restore_uid: 0/0
> debug1: ssh_rsa_verify: signature correct
> Accepted publickey for kaymes from 132.230.75.74 port 55348 ssh2
> debug1: Entering interactive session for SSH2.
> debug1: server_init_dispatch_20
> debug1: server_input_channel_open: ctype session rchan 0 win 65536 max
> 16384 debug1: input_session_request
> debug1: channel 0: new [server-session]
> debug1: session_new: init
> debug1: session_new: session 0
> debug1: session_open: channel 0
> debug1: session_open: session 0: link with channel 0
> debug1: server_input_channel_open: confirm session
> debug1: server_input_channel_req: channel 0 request pty-req reply 0
> debug1: session_by_channel: session 0 channel 0
> debug1: session_input_channel_req: session 0 req pty-req
> debug1: Allocating pty.
> debug1: session_pty_req: session 0 alloc /dev/pts/0
> debug1: server_input_channel_req: channel 0 request x11-req reply 0
> debug1: session_by_channel: session 0 channel 0
> debug1: session_input_channel_req: session 0 req x11-req
> debug1: x11_create_display_inet: Socket family 10 not supported
> debug1: x11_create_display_inet: Socket family 10 not supported
> debug1: x11_create_display_inet: Socket family 10 not supported
> debug1: x11_create_display_inet: Socket family 10 not supported
>
> [ MANY MANY identical lines skipped ]
>
> debug1: x11_create_display_inet: Socket family 10 not supported
> debug1: x11_create_display_inet: Socket family 10 not supported
> debug1: x11_create_display_inet: Socket family 10 not supported
> debug1: x11_create_display_inet: Socket family 10 not supported
> Failed to allocate internet-domain X11 display socket.
> debug1: x11_create_display_inet failed.
> debug1: server_input_channel_req: channel 0 request
> auth-agent-req@openssh.com reply 0 debug1: session_by_channel: session 0
> channel 0
> debug1: session_input_channel_req: session 0 req auth-agent-req@openssh.com
> debug1: temporarily_use_uid: 1014/1014 (e=0/0)
> debug1: restore_uid: 0/0
> debug1: channel 1: new [auth socket]
> debug1: server_input_channel_req: channel 0 request shell reply 0
> debug1: session_by_channel: session 0 channel 0
> debug1: session_input_channel_req: session 0 req shell
> debug1: PAM: setting PAM_TTY to "/dev/pts/0"
> debug1: PAM: establishing credentials
> debug1: Setting controlling tty using TIOCSCTTY.
> debug1: server_input_channel_req: channel 0 request window-change reply 0
> debug1: session_by_channel: session 0 channel 0
> debug1: session_input_channel_req: session 0 req window-change
>
> Now the Session was established.
>
>
> -- System Information:
> Debian Release: 3.1
>   APT prefers testing
>   APT policy: (500, 'testing')
> Architecture: i386 (i686)
> Kernel: Linux 2.6.8-client
> Locale: LANG=de_DE@euro, LC_CTYPE=de_DE@euro (charmap=ISO-8859-15)
>
> Versions of packages ssh depends on:
> ii  adduser                     3.59         Add and remove users and
> groups ii  debconf                     1.4.30.11    Debian configuration
> management sy ii  dpkg                        1.10.26      Package
> maintenance system for Deb ii  libc6                       2.3.2.ds1-20 GNU
> C Library: Shared libraries an ii  libpam-modules              0.76-22     
> Pluggable Authentication Modules f ii  libpam-runtime              0.76-22 
>     Runtime support for the PAM librar ii  libpam0g                   
> 0.76-22      Pluggable Authentication Modules l ii  libssl0.9.7            
>     0.9.7e-2     SSL shared libraries
> ii  libwrap0                    7.6.dbs-6    Wietse Venema's TCP wrappers
> libra ii  zlib1g                      1:1.2.2-3    compression library -
> runtime
>
> -- debconf information excluded




Reply to: