--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: ssh: "lost connection" when trying to scp... but ssh fine.
- From: Mozai <moses@mozai.com>
- Date: Thu, 03 Jul 2003 15:36:25 -0400
- Message-id: <E19Y9sX-0002LC-00@mail.mozai.com>
Package: ssh
Version: 1:3.6.1p2-2
Severity: normal
Started today, and the problem exists in sshd/stable and sshd/testing.
When I try to use scp from a remote machine to upload a file, I get a
"lost connection" error. The progress bar says that the upload
completed, but the target file is zero bytes in length. I can still use
ssh to get a shell when coming from the same remote machine, no problem.
sftp gives a similar error message.
If nothing else, what is a signal 25 ?
--- Here's debug output, SSH v1 protocol
mmoore@rock:~$ scp -v -1 x.deb moses@mozai.com:
Executing: program /usr/bin/ssh host mozai.com, user moses, command scp -v -t .
OpenSSH_3.4p1 Debian 1:3.4p1-1, SSH protocols 1.5/2.0, OpenSSL 0x0090605f
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: Rhosts Authentication disabled, originating port will not be trusted.
debug1: ssh_connect: needpriv 0
debug1: Connecting to mozai.com [205.233.216.234] port 22.
debug1: Connection established.
debug1: identity file /home/mmoore/.ssh/identity type -1
debug1: Remote protocol version 1.5, remote software version OpenSSH_3.6.1p2 Debian 1:3.6.1p2-2
debug1: match: OpenSSH_3.6.1p2 Debian 1:3.6.1p2-2 pat OpenSSH*
debug1: Local version string SSH-1.5-OpenSSH_3.4p1 Debian 1:3.4p1-1
debug1: Waiting for server public key.
debug1: Received server public key (768 bits) and host key (1024 bits).
debug1: Host 'mozai.com' is known and matches the RSA1 host key.
debug1: Found key in /home/mmoore/.ssh/known_hosts:30
debug1: Encryption type: 3des
debug1: Sent encrypted session key.
debug1: cipher_init: set keylen (16 -> 32)
debug1: cipher_init: set keylen (16 -> 32)
debug1: Installing crc compensation attack detector.
debug1: Received encrypted confirmation.
debug1: Doing password authentication.
moses@mozai.com's password:
debug1: Sending command: scp -v -t .
debug1: Entering interactive session.
debug1: fd 0 setting O_NONBLOCK
debug1: fd 1 setting O_NONBLOCK
Sending file modes: C0644 69310 x.deb
x.deb 100% |*****************************| 69310
00:00
Received disconnect from 205.233.216.234: Command terminated on signal 25.
debug1: Calling cleanup 0x8063a9c(0x0)
lost connection
mmoore@rock:~$
---here's debug output, SSH v2 protocol
mmoore@rock:~$ scp -v -2 x.deb moses@mozai.com:
Executing: program /usr/bin/ssh host mozai.com, user moses, command scp -v -t .
OpenSSH_3.4p1 Debian 1:3.4p1-1, SSH protocols 1.5/2.0, OpenSSL 0x0090605f
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: Rhosts Authentication disabled, originating port will not be trusted.
debug1: ssh_connect: needpriv 0
debug1: Connecting to mozai.com [205.233.216.234] port 22.
debug1: Connection established.
debug1: identity file /home/mmoore/.ssh/id_rsa type -1
debug1: identity file /home/mmoore/.ssh/id_dsa type -1
debug1: Remote protocol version 1.99, remote software version OpenSSH_3.6.1p2 Debian 1:3.6.1p2-2
debug1: match: OpenSSH_3.6.1p2 Debian 1:3.6.1p2-2 pat OpenSSH*
Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_3.4p1 Debian 1:3.4p1-1
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug1: kex: server->client aes128-cbc hmac-md5 none
debug1: kex: client->server aes128-cbc hmac-md5 none
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
debug1: dh_gen_key: priv key bits set: 136/256
debug1: bits set: 1548/3191
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
debug1: Host 'mozai.com' is known and matches the RSA host key.
debug1: Found key in /home/mmoore/.ssh/known_hosts:29
debug1: bits set: 1598/3191
debug1: ssh_rsa_verify: signature correct
debug1: kex_derive_keys
debug1: newkeys: mode 1
debug1: SSH2_MSG_NEWKEYS sent
debug1: waiting for SSH2_MSG_NEWKEYS
debug1: newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: done: ssh_kex2.
debug1: send SSH2_MSG_SERVICE_REQUEST
debug1: service_accept: ssh-userauth
debug1: got SSH2_MSG_SERVICE_ACCEPT
debug1: authentications that can continue: publickey,password
debug1: next auth method to try is publickey
debug1: try privkey: /home/mmoore/.ssh/id_rsa
debug1: try privkey: /home/mmoore/.ssh/id_dsa
debug1: next auth method to try is password
moses@mozai.com's password:
debug1: ssh-userauth2 successful: method password
debug1: fd 4 setting O_NONBLOCK
debug1: fd 5 setting O_NONBLOCK
debug1: channel 0: new [client-session]
debug1: send channel open 0
debug1: Entering interactive session.
debug1: ssh_session2_setup: id 0
debug1: Sending command: scp -v -t .
debug1: channel request 0: exec
debug1: channel 0: open confirm rwindow 0 rmax 32768
Sending file modes: C0644 69310 x.deb
x.deb 100% |*****************************| 69310 00:00
debug1: client_input_channel_req: channel 0 rtype exit-signal reply 0
debug1: channel 0: rcvd eof
debug1: channel 0: output open -> drain
debug1: channel 0: obuf empty
debug1: channel 0: close_write
debug1: channel 0: output drain -> closed
debug1: channel 0: rcvd close
debug1: channel 0: close_read
debug1: channel 0: input open -> closed
debug1: channel 0: almost dead
debug1: channel 0: gc: notify user
debug1: channel 0: gc: user detached
debug1: channel 0: send close
debug1: channel 0: is dead
debug1: channel 0: garbage collecting
debug1: channel_free: channel 0: client-session, nchannels 1
debug1: fd 0 clearing O_NONBLOCK
debug1: fd 1 clearing O_NONBLOCK
debug1: Transferred: stdin 0, stdout 0, stderr 0 bytes in 0.5 seconds
debug1: Bytes per second: stdin 0.0, stdout 0.0, stderr 0.0
debug1: Exit status -1
lost connection
mmoore@rock:~$
-- System Information
Debian Release: 3.0
Architecture: i386
Kernel: Linux margot 2.4.19 #8 Sat Aug 31 19:47:38 EDT 2002 i686
Locale: LANG=en_CA, LC_CTYPE=en_CA
Versions of packages ssh depends on:
ii adduser 3.47 Add and remove users and groups
ii debconf 1.2.35 Debian configuration management sy
ii libc6 2.3.1-16 GNU C Library: Shared libraries an
ii libpam-modules 0.72-35 Pluggable Authentication Modules f
ii libpam0g 0.76-9 Pluggable Authentication Modules l
ii libssl0.9.7 0.9.7a-1 SSL shared libraries
ii libwrap0 7.6-9 Wietse Venema's TCP wrappers libra
ii zlib1g 1:1.1.4-1 compression library - runtime
--- End Message ---
--- Begin Message ---
- To: 199914-done@bugs.debian.org
- Subject: Re: Bug#199914: Found it
- From: Colin Watson <cjwatson@debian.org>
- Date: Tue, 12 Jun 2007 15:45:11 +0100
- Message-id: <20070612144511.GD4163@riva.ucam.org>
- In-reply-to: <20030703195914.GE26678@mozai.com>
- References: <20030703195914.GE26678@mozai.com>
On Thu, Jul 03, 2003 at 03:59:14PM -0400, Mozai wrote:
> Huzzah for running tripwire every day.
>
> I checked the files that have been changed in the past two days, and
> found that the problem was caused by a setting
> /etc/security/limits.conf:
>
> # limit size of any one of users' files to 1GB (runaway file i/o)
> * hard fsize 1073741824
Right, that would do it. Note that the signal 25 you saw originally is
SIGXFSZ ("File size limit exceeded"); see 'kill -l' and signal(7).
> I thought that this limited the size of any single file belonging to any
> user, and the limit of the sum of a user's file sizes could only be set
> in the filesystem. If the latter is the case, then this is still a bug.
Unless I'm reading setrlimit(2) very wrongly indeed, it's a limit on the
size of any single file.
Sorry for taking so long to respond to this bug!
--
Colin Watson [cjwatson@debian.org]
--- End Message ---