[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#364634: ssh: Weird behavior with broken key



Package: ssh
Version: 1:3.8.1p1-8.sarge.4
Severity: normal


With a broken RSA key sshd produced the following debug output.

[Andreas Schuldei (stockholm) has discussed this with Kamion on IRC.]

debug2: read_server_config: filename /etc/ssh/sshd_config
debug1: sshd version OpenSSH_3.8.1p1 Debian-8.sarge.4
debug3: Not a RSA1 key file /etc/ssh/ssh_host_rsa_key.
debug1: read PEM private key done: type RSA
debug1: private host key: #0 type 1 RSA
debug3: Not a RSA1 key file /etc/ssh/ssh_host_dsa_key.
debug1: read PEM private key done: type DSA
debug1: private host key: #1 type 2 DSA
socket: Address family not supported by protocol
debug1: Bind to port 21 on 0.0.0.0.
Server listening on 0.0.0.0 port 21.
debug1: Server will not fork when running in debugging mode.
Connection from 81.27.1.68 port 36512
debug1: Client protocol version 2.0; client software version OpenSSH_4.2p1 Debian-8
debug1: match: OpenSSH_4.2p1 Debian-8 pat OpenSSH*
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_3.8.1p1 Debian-8.sarge.4
debug2: Network child is on pid 929
debug3: preauth child monitor started
debug3: mm_request_receive entering
debug3: privsep user:group 100:65534
debug1: permanently_set_uid: 100/65534
debug1: list_hostkey_types: ssh-rsa,ssh-dss
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: first_kex_follows 0 
debug2: kex_parse_kexinit: reserved 0 
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: 
debug2: kex_parse_kexinit: first_kex_follows 0 
debug2: kex_parse_kexinit: reserved 0 
debug2: mac_init: found hmac-md5
debug1: kex: client->server aes128-cbc hmac-md5 none
debug2: mac_init: found hmac-md5
debug1: kex: server->client aes128-cbc hmac-md5 none
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST received
debug3: mm_request_send entering: type 0
debug3: mm_choose_dh: waiting for MONITOR_ANS_MODULI
debug3: mm_request_receive_expect entering: type 1
debug3: mm_request_receive entering
debug3: monitor_read: checking request 0
debug3: mm_answer_moduli: got parameters: 1024 1024 8192
debug3: mm_request_send entering: type 1
debug2: monitor_read: 0 used once, disabling now
debug3: mm_request_receive entering
debug3: mm_choose_dh: remaining 0
debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent
debug2: dh_gen_key: priv key bits set: 141/256
debug2: bits set: 491/1024
debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT
debug2: bits set: 493/1024
debug3: mm_key_sign entering
debug3: mm_request_send entering: type 4
debug3: mm_key_sign: waiting for MONITOR_ANS_SIGN
debug3: mm_request_receive_expect entering: type 5
debug3: mm_request_receive entering
debug3: monitor_read: checking request 4
debug3: mm_answer_sign
debug3: mm_answer_sign: signature 0x8428da8(143)
debug3: mm_request_send entering: type 5
debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent
debug2: kex_derive_keys
debug2: set_newkeys: mode 1
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug2: monitor_read: 4 used once, disabling now
debug3: mm_request_receive entering
debug2: set_newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: KEX done
debug1: userauth-request for user andi service ssh-connection method none
debug1: attempt 0 failures 0
debug3: mm_getpwnamallow entering
debug3: mm_request_send entering: type 6
debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM
debug3: mm_request_receive_expect entering: type 7
debug3: mm_request_receive entering
debug3: monitor_read: checking request 6
debug3: mm_answer_pwnamallow
debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1
debug3: mm_request_send entering: type 7
debug2: monitor_read: 6 used once, disabling now
debug3: mm_request_receive entering
debug2: input_userauth_request: setting up authctxt for andi
debug3: mm_start_pam entering
debug3: mm_request_send entering: type 45
debug3: mm_inform_authserv entering
debug3: mm_request_send entering: type 3
debug2: input_userauth_request: try method none
Failed none for andi from 81.27.1.68 port 36512 ssh2
debug3: monitor_read: checking request 45
debug1: PAM: initializing for "andi"
debug3: Trying to reverse map address 81.27.1.68.
debug1: PAM: setting PAM_RHOST to "petrus.schuldei.org"
debug1: PAM: setting PAM_TTY to "ssh"
debug2: monitor_read: 45 used once, disabling now
debug3: mm_request_receive entering
debug3: monitor_read: checking request 3
debug3: mm_answer_authserv: service=ssh-connection, style=
debug2: monitor_read: 3 used once, disabling now
debug3: mm_request_receive entering
debug1: userauth-request for user andi service ssh-connection method publickey
debug1: attempt 1 failures 1
debug2: input_userauth_request: try method publickey
debug1: test whether pkalg/pkblob are acceptable
debug3: mm_key_allowed entering
debug3: mm_request_send entering: type 20
debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED
debug3: mm_request_receive_expect entering: type 21
debug3: mm_request_receive entering
debug3: monitor_read: checking request 20
debug3: mm_answer_keyallowed entering
debug3: mm_answer_keyallowed: key_from_blob: 0x842ac98
debug1: temporarily_use_uid: 1003/1003 (e=0/0)
debug1: trying public key file /home/andi/.ssh/authorized_keys
debug3: secure_filename: checking '/home/andi/.ssh'
debug3: secure_filename: checking '/home/andi'
debug3: secure_filename: terminating check at '/home/andi'
debug3: key_read: type mismatch
debug2: user_key_allowed: check options: 'ssh-dss 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 sigrid@andi
'
debug2: key_type_from_name: unknown key type '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'
debug3: key_read: missing keytype
debug2: user_key_allowed: advance: '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 sigrid@andi
'
debug3: key_read: type mismatch
debug2: user_key_allowed: check options: 'ssh-dss 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 andreas@markus
'
debug2: key_type_from_name: unknown key type 'AAAAB3NzaC1kc3MAAACBAOZ1GEs0tRW8DRdlNAd9+lEBO/zXOcy10UZ0avu5wPL0IYHVti1oxJQP0COOjAjyQY7xldvieJMIP+wyq5J+otfeqyZpeh4v0fQ5m8XjPV+tM0U4UwF21k/ferSsFKNJLP8KrDIrxzZbcBrXzGesUIa3xsssPcz3xMOS53n+NK69AAAAFQDTa1bQbGZ1zHMvKAdyP3J4BD3NCwAAAIBXaiEv3aZDA2q5M4rJCXqvPNOS9WjmFFpSgnRhaGIjhpo4L537UrKYwT1e2ngbCVFNGVUEJeGkxEzV1E13Xo5NNUWeGLDDSTijAmXwcR6N18uyJZ8u/EcOxMZnJtr4MDcsCJq7PuTvV/+cP/lffte/ikkDOvDgE+QDKIEX0k7e3AAAAIAJg2BGUF+LwVq17BMt/Vt9E2FxuzawEINfvNPZjbRzoPAFU9JuZhLEDeI6JZpALPaBL3CLnAiFZn7zb0OYfSL5KQ255iobqFRpykJdezJ1Ln32FRF2gYfe7j6nfraILXUq+PGxWbG6Rior+h8N7TK21L8/StggjZbPSy9Fi7zIMg=='
debug3: key_read: missing keytype
debug2: user_key_allowed: advance: 'AAAAB3NzaC1kc3MAAACBAOZ1GEs0tRW8DRdlNAd9+lEBO/zXOcy10UZ0avu5wPL0IYHVti1oxJQP0COOjAjyQY7xldvieJMIP+wyq5J+otfeqyZpeh4v0fQ5m8XjPV+tM0U4UwF21k/ferSsFKNJLP8KrDIrxzZbcBrXzGesUIa3xsssPcz3xMOS53n+NK69AAAAFQDTa1bQbGZ1zHMvKAdyP3J4BD3NCwAAAIBXaiEv3aZDA2q5M4rJCXqvPNOS9WjmFFpSgnRhaGIjhpo4L537UrKYwT1e2ngbCVFNGVUEJeGkxEzV1E13Xo5NNUWeGLDDSTijAmXwcR6N18uyJZ8u/EcOxMZnJtr4MDcsCJq7PuTvV/+cP/lffte/ikkDOvDgE+QDKIEX0k7e3AAAAIAJg2BGUF+LwVq17BMt/Vt9E2FxuzawEINfvNPZjbRzoPAFU9JuZhLEDeI6JZpALPaBL3CLnAiFZn7zb0OYfSL5KQ255iobqFRpykJdezJ1Ln32FRF2gYfe7j6nfraILXUq+PGxWbG6Rior+h8N7TK21L8/StggjZbPSy9Fi7zIMg== andreas@markus
'
debug1: restore_uid: 0/0
debug2: key not found
debug1: temporarily_use_uid: 1003/1003 (e=0/0)
debug1: trying public key file /home/andi/.ssh/authorized_keys2
debug1: restore_uid: 0/0
debug3: mm_answer_keyallowed: key 0x842ac98 is disallowed
debug3: mm_request_send entering: type 21
debug3: mm_request_receive entering
debug2: userauth_pubkey: authenticated 0 pkalg ssh-rsa
Failed publickey for andi from 81.27.1.68 port 36512 ssh2
debug1: userauth-request for user andi service ssh-connection method publickey
debug1: attempt 2 failures 2
debug2: input_userauth_request: try method publickey
debug1: test whether pkalg/pkblob are acceptable
debug3: mm_key_allowed entering
debug3: mm_request_send entering: type 20
debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED
debug3: mm_request_receive_expect entering: type 21
debug3: mm_request_receive entering
debug3: monitor_read: checking request 20
debug3: mm_answer_keyallowed entering
debug3: mm_answer_keyallowed: key_from_blob: 0x842acc8
debug1: temporarily_use_uid: 1003/1003 (e=0/0)
debug1: trying public key file /home/andi/.ssh/authorized_keys
debug3: secure_filename: checking '/home/andi/.ssh'
debug3: secure_filename: checking '/home/andi'
debug3: secure_filename: terminating check at '/home/andi'
debug3: key_read: type mismatch
debug2: user_key_allowed: check options: 'ssh-dss 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 sigrid@andi
'
debug2: key_type_from_name: unknown key type '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'
debug3: key_read: missing keytype
debug2: user_key_allowed: advance: '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 sigrid@andi
'
debug3: key_read: type mismatch
debug2: user_key_allowed: check options: 'ssh-dss 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 andreas@markus
'
debug2: key_type_from_name: unknown key type 'AAAAB3NzaC1kc3MAAACBAOZ1GEs0tRW8DRdlNAd9+lEBO/zXOcy10UZ0avu5wPL0IYHVti1oxJQP0COOjAjyQY7xldvieJMIP+wyq5J+otfeqyZpeh4v0fQ5m8XjPV+tM0U4UwF21k/ferSsFKNJLP8KrDIrxzZbcBrXzGesUIa3xsssPcz3xMOS53n+NK69AAAAFQDTa1bQbGZ1zHMvKAdyP3J4BD3NCwAAAIBXaiEv3aZDA2q5M4rJCXqvPNOS9WjmFFpSgnRhaGIjhpo4L537UrKYwT1e2ngbCVFNGVUEJeGkxEzV1E13Xo5NNUWeGLDDSTijAmXwcR6N18uyJZ8u/EcOxMZnJtr4MDcsCJq7PuTvV/+cP/lffte/ikkDOvDgE+QDKIEX0k7e3AAAAIAJg2BGUF+LwVq17BMt/Vt9E2FxuzawEINfvNPZjbRzoPAFU9JuZhLEDeI6JZpALPaBL3CLnAiFZn7zb0OYfSL5KQ255iobqFRpykJdezJ1Ln32FRF2gYfe7j6nfraILXUq+PGxWbG6Rior+h8N7TK21L8/StggjZbPSy9Fi7zIMg=='
debug3: key_read: missing keytype
debug2: user_key_allowed: advance: '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 andreas@markus
'
debug1: matching key found: file /home/andi/.ssh/authorized_keys, line 7
Found matching RSA key: 63:20:e7:e0:26:f4:e8:99:5f:9b:70:fb:7e:16:de:80
debug1: restore_uid: 0/0
debug3: mm_answer_keyallowed: key 0x842acc8 is allowed
debug3: mm_request_send entering: type 21
debug3: mm_request_receive entering
debug2: userauth_pubkey: authenticated 0 pkalg ssh-rsa
Postponed publickey for andi from 81.27.1.68 port 36512 ssh2
debug1: userauth-request for user andi service ssh-connection method publickey
debug1: attempt 3 failures 2
debug2: input_userauth_request: try method publickey
debug3: mm_key_allowed entering
debug3: mm_request_send entering: type 20
debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED
debug3: mm_request_receive_expect entering: type 21
debug3: mm_request_receive entering
debug3: monitor_read: checking request 20
debug3: mm_answer_keyallowed entering
debug3: mm_answer_keyallowed: key_from_blob: 0x842ace8
debug1: temporarily_use_uid: 1003/1003 (e=0/0)
debug1: trying public key file /home/andi/.ssh/authorized_keys
debug3: secure_filename: checking '/home/andi/.ssh'
debug3: secure_filename: checking '/home/andi'
debug3: secure_filename: terminating check at '/home/andi'
debug3: key_read: type mismatch
debug2: user_key_allowed: check options: 'ssh-dss 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 sigrid@andi
'
debug2: key_type_from_name: unknown key type 'AAAAB3NzaC1kc3MAAACBAPJzNdlYCIk7Ynvrw4sC6rieLNUYqVP9iQR0IvnGQMcPlzN65W48jJu1mPrZGBjuFEZmRxOhkgjR+oxJWbPMMAg2Fkl9mHgge6cUyJt8CkhZS2Im7aAO8zcm8MdJINAxxqwmm2AV8XvhEKJJTzLJAlZv5P0AbQBXumUDW547r/rdAAAAFQCHyVdO/nKV/v7QS9/wixE5zpLOpQAAAIA2Jj2u3NIrpYGiB1G1Cmfp4hFYDM9qOcYPP88feBEWCsvJ8KGK5GMqC88JNqFmlR2aUgg4plyCksscvIT2IcpHlmU9EmsuHgpfM0DFLJNaXLUC0cul/CagJxCN6exIFZe5mae4WmCpffYcqG//NhIOOpUbwcugQA+2MCJ2qbTAqQAAAIEA3eLBPr9Q3u63PfPS/xEsEdlF8QyVABmP74T1AfydW3effqaXUmAMkwe9pEIMHQarxHj4NAFz24DqXckVvVj+7shP2YsMEZ+tE6eMfOJ0+kJCtzZqDAxoyioBZZugB8cXJvRb4KqojTFRq3UUqODE1s3V8v2DUpoT6SEOE35t0W0='
debug3: key_read: missing keytype
debug2: user_key_allowed: advance: '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 sigrid@andi
'
debug3: key_read: type mismatch
debug2: user_key_allowed: check options: 'ssh-dss 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 andreas@markus
'
debug2: key_type_from_name: unknown key type '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'
debug3: key_read: missing keytype
debug2: user_key_allowed: advance: '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 andreas@markus
'
debug1: matching key found: file /home/andi/.ssh/authorized_keys, line 7
Found matching RSA key: 63:20:e7:e0:26:f4:e8:99:5f:9b:70:fb:7e:16:de:80
debug1: restore_uid: 0/0
debug3: mm_answer_keyallowed: key 0x842ace8 is allowed
debug3: mm_request_send entering: type 21
debug3: mm_request_receive entering
debug3: mm_key_verify entering
debug3: mm_request_send entering: type 22
debug3: mm_key_verify: waiting for MONITOR_ANS_KEYVERIFY
debug3: mm_request_receive_expect entering: type 23
debug3: mm_request_receive entering
debug3: monitor_read: checking request 22
ssh_rsa_verify: len 512 > modlen 256
debug3: mm_answer_keyverify: key 0x842acd8 signature verified
debug3: mm_request_send entering: type 23
debug3: mm_request_receive_expect entering: type 46
debug3: mm_request_receive entering
debug2: userauth_pubkey: authenticated 0 pkalg ssh-rsa
Failed publickey for andi from 81.27.1.68 port 36512 ssh2
debug1: userauth-request for user andi service ssh-connection method keyboard-interactive
debug1: attempt 4 failures 3
debug2: input_userauth_request: try method keyboard-interactive
debug1: keyboard-interactive devs 
debug1: auth2_challenge: user=andi devs=
debug1: kbdint_alloc: devices 'pam'
debug2: auth2_challenge_start: devices pam
debug2: kbdint_next_device: devices <empty>
debug1: auth2_challenge_start: trying authentication method 'pam'
debug3: mm_sshpam_init_ctx
debug3: mm_request_send entering: type 48
debug3: mm_sshpam_init_ctx: waiting for MONITOR_ANS_PAM_INIT_CTX
debug3: mm_request_receive_expect entering: type 49
debug3: mm_request_receive entering
mm_request_receive_expect: read: rtype 48 != type 46
debug1: do_cleanup
debug1: PAM: cleanup
debug3: PAM: sshpam_thread_cleanup entering
debug1: do_cleanup
debug1: PAM: cleanup
debug3: PAM: sshpam_thread_cleanup entering


-- System Information:
Debian Release: 3.1
Architecture: i386 (i686)
Kernel: Linux 2.4.26-exec-shield
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)

Versions of packages ssh depends on:
ii  adduser                3.63              Add and remove users and groups
ii  debconf                1.4.30.13         Debian configuration management sy
ii  dpkg                   1.10.28           Package maintenance system for Deb
ii  libc6                  2.3.2.ds1-22      GNU C Library: Shared libraries an
ii  libpam-modules         0.76-22           Pluggable Authentication Modules f
ii  libpam-runtime         0.76-22           Runtime support for the PAM librar
ii  libpam0g               0.76-22           Pluggable Authentication Modules l
ii  libssl0.9.7            0.9.7e-3sarge1    SSL shared libraries
ii  libwrap0               7.6.dbs-8         Wietse Venema's TCP wrappers libra
ii  zlib1g                 1:1.2.2-4.sarge.2 compression library - runtime

-- debconf information:
  ssh/insecure_rshd:
  ssh/ssh2_keys_merged:
  ssh/user_environment_tell:
* ssh/forward_warning:
  ssh/insecure_telnetd:
  ssh/new_config: true
* ssh/use_old_init_script: true
* ssh/protocol2_only: true
  ssh/encrypted_host_key_but_no_keygen:
* ssh/run_sshd: true
* ssh/SUID_client: true
  ssh/disable_cr_auth: false




Reply to: