Re: ssh xterm -> HPUX fails

From: Adam Skeggs (adamskeg_at_au1.ibm.com)
Date: 02/11/04


Date: Wed, 11 Feb 2004 17:05:16 +1100


"Richard E. Silverman" <res@qoxp.net> wrote in message
news:m2d68mwtj5.fsf@darwin.oankali.net...
> >>>>> "AS" == Adam Skeggs <adamskeg@au1.ibm.com> writes:
>
> AS> Ok then. So I need to allow the dummy X server to be connected to
> AS> by a process on that machine machine (the remote
> AS> machine). Normally I would do this with xauth +myhost although I
> AS> would have thought that there would be a localhost entry by
> AS> default. Anyway, xauth wants a valid DISPLAY to run; I am working
> AS> remotely and cannot do that. I need to run over ssh thus I am in a
> AS> catch 22 situation. I need to use xauth without a DISPLAY!
>
> No, this is all wrong.
>
> 1) RTFM, especially the ssh(1) section entitled "X11 and TCP forwarding."

Done. I was in fantasy land.

>
> 2) Follow the debugging suggestions I already gave:
>
> >> http://www.snailbook.com/faq/general-debugging.auto.html

sshd appears to shutdown when debugging is turned on. See debug info below.

>
> 3) Then ask more questions.

Why doesn't it work?

Server side details:
SOEopenssh 3.4p1 OpenSSH for HP-UX 11.x
HP-UX vuh245 B.11.11 U 9000/820

Client side details:
OpenSSH_3.7.1p2, SSH protocols 1.5/2.0, OpenSSL 0.9.7c 30 Sep 2003

SERVER side debug
==============
OpenSSH started
PRNG from /usr/local/libexec/ssh-rand-helper

debug1: sshd version OpenSSH_3.4p1

debug1: private host key: #0 type 0 RSA1

debug3: Not a RSA1 key file /usr/local/etc/ssh_host_rsa_key.

debug1: read PEM private key done: type RSA

debug1: private host key: #1 type 1 RSA

debug3: Not a RSA1 key file /usr/local/etc/ssh_host_dsa_key.

debug1: read PEM private key done: type DSA

debug1: private host key: #2 type 2 DSA

debug1: Bind to port 22 on 0.0.0.0.

Server listening on 0.0.0.0 port 22.

Generating 768 bit RSA key.

RSA key generation complete.

debug1: Server will not fork when running in debugging mode.

Connection from 172.202.4.127 port 2320

debug1: Client protocol version 2.0; client software version OpenSSH_3.7.1p2

debug1: match: OpenSSH_3.7.1p2 pat OpenSSH*

Enabling compatibility mode for protocol 2.0

debug1: Local version string SSH-1.99-OpenSSH_3.4p1

debug2: Network child is on pid 3522

debug3: preauth child monitor started

debug3: mm_request_receive entering

debug3: privsep user:group 107:113

debug1: list_hostkey_types: ssh-rsa,ssh-dss

debug1: SSH2_MSG_KEXINIT sent

debug1: SSH2_MSG_KEXINIT received

debug2: kex_parse_kexinit:
diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1

debug2: kex_parse_kexinit: ssh-rsa,ssh-dss

debug2: kex_parse_kexinit:
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,r
ijndael-cbc@lysator.liu.se

debug2: kex_parse_kexinit:
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,r
ijndael-cbc@lysator.liu.se

debug2: kex_parse_kexinit:
hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hm
ac-md5-96

debug2: kex_parse_kexinit:
hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hm
ac-md5-96

debug2: kex_parse_kexinit: none,zlib

debug2: kex_parse_kexinit: none,zlib

debug2: kex_parse_kexinit:

debug2: kex_parse_kexinit:

debug2: kex_parse_kexinit: first_kex_follows 0

debug2: kex_parse_kexinit: reserved 0

debug2: kex_parse_kexinit:
diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1

debug2: kex_parse_kexinit: ssh-rsa,ssh-dss

debug2: kex_parse_kexinit:
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,r
ijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr

debug2: kex_parse_kexinit:
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,r
ijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr

debug2: kex_parse_kexinit:
hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hm
ac-md5-96

debug2: kex_parse_kexinit:
hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hm
ac-md5-96

debug2: kex_parse_kexinit: none,zlib

debug2: kex_parse_kexinit: none,zlib

debug2: kex_parse_kexinit:

debug2: kex_parse_kexinit:

debug2: kex_parse_kexinit: first_kex_follows 0

debug2: kex_parse_kexinit: reserved 0

debug2: mac_init: found hmac-md5

debug1: kex: client->server aes128-cbc hmac-md5 none

debug2: mac_init: found hmac-md5

debug1: kex: server->client aes128-cbc hmac-md5 none

debug1: SSH2_MSG_KEX_DH_GEX_REQUEST received

debug3: mm_request_send entering: type 0

debug3: mm_choose_dh: waiting for MONITOR_ANS_MODULI

debug3: monitor_read: checking request 0debug3: mm_request_receive_expect
entering: type 1

debug3: mm_answer_moduli: got parameters: 1024 2048 8192debug3:
mm_request_receive entering

debug3: mm_request_send entering: type 1

debug2: monitor_read: 0 used once, disabling now

debug3: mm_request_receive enteringdebug3: mm_choose_dh: remaining 0

debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent

debug1: dh_gen_key: priv key bits set: 129/256

debug1: bits set: 1603/3191

debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT

debug1: bits set: 1609/3191

debug3: mm_key_sign entering

debug3: mm_request_send entering: type 4

debug3: mm_key_sign: waiting for MONITOR_ANS_SIGN

debug3: mm_request_receive_expect entering: type 5

debug3: monitor_read: checking request 4debug3: mm_request_receive entering

debug3: mm_answer_sign

debug3: mm_answer_sign: signature 4001bd18(143)

debug3: mm_request_send entering: type 5

debug2: monitor_read: 4 used once, disabling now

debug1: SSH2_MSG_KEX_DH_GEX_REPLY sentdebug3: mm_request_receive entering

debug1: kex_derive_keys

debug1: newkeys: mode 1

debug1: SSH2_MSG_NEWKEYS sent

debug1: waiting for SSH2_MSG_NEWKEYS

debug1: newkeys: mode 0

debug1: SSH2_MSG_NEWKEYS received

debug1: KEX done

debug1: userauth-request for user c824039 service ssh-connection method none

debug1: attempt 0 failures 0

debug3: mm_getpwnamallow entering

debug3: mm_request_send entering: type 6

debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM

debug3: monitor_read: checking request 6debug3: mm_request_receive_expect
entering: type 7

debug3: mm_answer_pwnamallowdebug3: mm_request_receive entering

debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1

debug3: mm_request_send entering: type 7

debug2: monitor_read: 6 used once, disabling now

debug2: input_userauth_request: setting up authctxt for c824039debug3:
mm_request_receive entering

debug3: mm_inform_authserv entering

debug3: mm_request_send entering: type 3

debug2: input_userauth_request: try method nonedebug3: monitor_read:
checking request 3

debug3: mm_auth_password entering

debug3: mm_answer_authserv: service=ssh-connection, style=debug3:
mm_request_send entering: type 10

debug2: monitor_read: 3 used once, disabling now

debug3: mm_auth_password: waiting for MONITOR_ANS_AUTHPASSWORDdebug3:
mm_request_receive entering

debug3: mm_request_receive_expect entering: type 11

debug3: monitor_read: checking request 10debug3: mm_request_receive entering

debug3: mm_answer_authpassword: sending result 0

debug3: mm_request_send entering: type 11

debug3: mm_auth_password: user not authenticated

Failed none for c824039 from 172.202.4.127 port 2320 ssh2

Failed none for c824039 from 172.202.4.127 port 2320 ssh2debug3:
mm_request_receive entering

debug1: userauth-request for user c824039 service ssh-connection method
publickey

debug1: attempt 1 failures 1

debug2: input_userauth_request: try method publickey

debug1: test whether pkalg/pkblob are acceptable

debug3: mm_key_allowed entering

debug3: mm_request_send entering: type 20

debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWEDdebug3:
monitor_read: checking request 20

debug3: mm_request_receive_expect entering: type 21debug3:
mm_answer_keyallowed entering

debug3: mm_request_receive entering

debug3: mm_answer_keyallowed: key_from_blob: 4001bd70

debug1: temporarily_use_uid: 113/101 (e=0)

debug1: trying public key file /home/fabric/c824039/.ssh/authorized_keys

debug3: secure_filename: checking '/home/fabric/c824039/.ssh'

debug3: secure_filename: checking '/home/fabric/c824039'

debug3: secure_filename: terminating check at '/home/fabric/c824039'

debug1: matching key found: file /home/fabric/c824039/.ssh/authorized_keys,
line 1

Found matching DSA key: <stuff deleted>

debug1: restore_uid

debug3: mm_answer_keyallowed: key 4001bd70 is allowed

debug3: mm_request_send entering: type 21

debug3: mm_request_receive entering

debug2: userauth_pubkey: authenticated 0 pkalg ssh-dss

Postponed publickey for c824039 from 172.202.4.127 port 2320 ssh2

debug1: userauth-request for user c824039 service ssh-connection method
publickey

debug1: attempt 2 failures 1

debug2: input_userauth_request: try method publickey

debug3: mm_key_allowed entering

debug3: mm_request_send entering: type 20

debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED

debug3: mm_request_receive_expect entering: type 21debug3: monitor_read:
checking request 20

debug3: mm_request_receive enteringdebug3: mm_answer_keyallowed entering

debug3: mm_answer_keyallowed: key_from_blob: 4001bd90

debug1: temporarily_use_uid: 113/101 (e=0)

debug1: trying public key file /home/fabric/c824039/.ssh/authorized_keys

debug3: secure_filename: checking '/home/fabric/c824039/.ssh'

debug3: secure_filename: checking '/home/fabric/c824039'

debug3: secure_filename: terminating check at '/home/fabric/c824039'

debug1: matching key found: file /home/fabric/c824039/.ssh/authorized_keys,
line 1

Found matching DSA key: <stuff deleted>

debug1: restore_uid

debug3: mm_answer_keyallowed: key 4001bd90 is allowed

debug3: mm_request_send entering: type 21

debug3: mm_request_receive enteringdebug3: mm_key_verify entering

debug3: mm_request_send entering: type 22

debug3: mm_key_verify: waiting for MONITOR_ANS_KEYVERIFY

debug3: monitor_read: checking request 22debug3: mm_request_receive_expect
entering: type 23

debug3: mm_request_receive entering

debug1: ssh_dss_verify: signature correct

debug3: mm_answer_keyverify: key 4001bdc0 signature verified

debug3: mm_request_send entering: type 23

debug2: userauth_pubkey: authenticated 1 pkalg ssh-dss

Accepted publickey for c824039 from 172.202.4.127 port 2320 ssh2

debug1: monitor_child_preauth: c824039 has been authenticated by privileged
process

Accepted publickey for c824039 from 172.202.4.127 port 2320 ssh2debug3:
mm_get_keystate: Waiting for new keys

debug3: mm_request_receive_expect entering: type 24

debug3: mm_request_receive entering

debug3: mm_send_keystate: Sending new keys: <stuff deleted>

debug3: mm_newkeys_to_blob: converting <stuff deleted>8

debug3: mm_newkeys_to_blob: converting <stuff deleted>

debug3: mm_send_keystate: New keys have been sent

debug3: mm_send_keystate: Sending compression state

debug3: mm_request_send entering: type 24

debug3: mm_send_keystate: Finished sending state

debug3: mm_newkeys_from_blob: <stuff deleted>)

debug2: mac_init: found hmac-md5

debug3: mm_get_keystate: Waiting for second key

debug3: mm_newkeys_from_blob: <stuff deleted>

debug2: mac_init: found hmac-md5

debug3: mm_get_keystate: Getting compression state

debug3: mm_get_keystate: Getting Network I/O buffers

debug3: mm_share_sync: Share sync

debug3: mm_share_sync: Share sync end

debug2: User child is on pid 3523

debug3: mm_request_receive entering

debug1: newkeys: mode 0

debug1: newkeys: mode 1

debug1: Entering interactive session for SSH2.

debug1: fd 8 setting O_NONBLOCK

debug1: fd 9 setting O_NONBLOCK

debug1: server_init_dispatch_20

debug1: server_input_channel_open: ctype session rchan 0 win 131072 max
32768

debug1: input_session_request

debug1: channel 0: new [server-session]

debug1: session_new: init

debug1: session_new: session 0

debug1: session_open: channel 0

debug1: session_open: session 0: link with channel 0

debug1: server_input_channel_open: confirm session

debug1: server_input_channel_req: channel 0 request x11-req reply 0

debug1: session_by_channel: session 0 channel 0

debug1: session_input_channel_req: session 0 req x11-req

debug1: fd 10 setting O_NONBLOCK

debug2: fd 10 is O_NONBLOCK

debug1: channel 1: new [X11 inet listener]

debug1: server_input_channel_req: channel 0 request exec reply 0

debug1: session_by_channel: session 0 channel 0

debug1: session_input_channel_req: session 0 req exec

debug1: fd 5 setting TCP_NODELAY

debug1: fd 13 setting O_NONBLOCK

debug1: fd 12 setting O_NONBLOCK

debug1: fd 15 setting O_NONBLOCK

debug2: channel 0: read 106 from efd 15

debug2: channel 0: rwin 131072 elen 106 euse 1

debug2: channel 0: sent ext data 106

debug2: channel 0: read 201 from efd 15

debug2: channel 0: rwin 130966 elen 201 euse 1

debug2: channel 0: sent ext data 201

debug2: channel 0: read 54 from efd 15

debug2: channel 0: rwin 130765 elen 54 euse 1

debug2: channel 0: sent ext data 54

debug2: channel 0: read 26 from efd 15

debug2: channel 0: rwin 130711 elen 26 euse 1

debug2: channel 0: sent ext data 26

debug2: channel 0: read 67 from efd 15

debug2: channel 0: rwin 130685 elen 67 euse 1

debug2: channel 0: sent ext data 67

debug2: channel 0: read 27 from efd 15

debug2: channel 0: rwin 130618 elen 27 euse 1

debug2: channel 0: sent ext data 27

debug1: X11 connection requested.

debug1: fd 11 setting TCP_NODELAY

debug1: fd 11 setting O_NONBLOCK

debug2: fd 11 is O_NONBLOCK

debug1: channel 2: new [X11 connection from 127.0.0.1 port 61741]

debug1: channel 2: open confirm rwindow 131072 rmax 16384

debug1: channel 2: rcvd eof

debug1: channel 2: output open -> drain

debug1: channel 2: obuf empty

debug1: channel 2: close_write

debug1: channel 2: output drain -> closed

debug1: channel 2: rcvd close

debug1: channel 2: close_read

debug1: channel 2: input open -> closed

debug3: channel 2: will not send data after close

debug1: channel 2: send close

debug1: channel 2: is dead

debug1: channel 2: garbage collecting

debug1: channel_free: channel 2: X11 connection from 127.0.0.1 port 61741,
nchannels 3

debug3: channel_free: status: The following connections are open:

  #0 server-session (t4 r0 i0/0 o0/0 fd 13/12)

  #2 X11 connection from 127.0.0.1 port 61741 (t4 r1 i3/0 o3/0 fd 11/11)

debug3: channel_close_fds: channel 2: r 11 w 11 e -1

debug2: channel 0: read 75 from efd 15

debug2: channel 0: rwin 130591 elen 75 euse 1

debug2: channel 0: sent ext data 75

debug1: channel 0: read<=0 rfd 13 len 0

debug1: channel 0: read failed

debug1: channel 0: close_read

debug1: channel 0: input open -> drain

debug1: Received SIGCHLD.

debug2: channel 0: read 0 from efd 15

debug2: channel 0: closing read-efd 15

debug1: channel 0: ibuf empty

debug1: channel 0: send eof

debug1: channel 0: input drain -> closed

debug2: notify_done: reading

debug1: session_by_pid: pid 3524

debug1: session_exit_message: session 0 channel 0 pid 3524

debug1: channel request 0: exit-status

debug1: session_exit_message: release channel 0

debug1: channel 0: write failed

debug1: channel 0: close_write

debug1: channel 0: output open -> closed

debug1: session_close: session 0 pid 3524

debug1: channel 0: send close

debug3: channel 0: will not send data after close

debug1: channel 0: rcvd close

debug3: channel 0: will not send data after close

debug1: channel 0: is dead

debug1: channel 0: garbage collecting

debug1: channel_free: channel 0: server-session, nchannels 2

debug3: channel_free: status: The following connections are open:

  #0 server-session (t4 r0 i3/0 o3/0 fd -1/-1)

debug3: channel_close_fds: channel 0: r -1 w -1 e -1

Connection closed by remote host.

debug1: channel_free: channel 1: X11 inet listener, nchannels 1

debug3: channel_free: status: The following connections are open:

debug3: channel_close_fds: channel 1: r 10 w 10 e -1

Closing connection to 172.202.4.127

debug3: mm_request_send entering: type 38

debug3: monitor_read: checking request 38

debug3: mm_answer_term: tearing down sessions

======================================================================

CLIENT SIDE (not the same session actually but so what?)

$ ssh -v -v -v vuh245.in.telstra.com.au /usr/bin/X11/xterm
OpenSSH_3.7.1p2, SSH protocols 1.5/2.0, OpenSSL 0.9.7c 30 Sep 2003
debug1: Reading configuration data /home/c824039/.ssh/config
debug1: Applying options for vuh245.in.telstra.com.au
debug2: ssh_connect: needpriv 0
debug1: Connecting to vuh245.in.telstra.com.au [192.74.148.29] port 22.
debug1: Connection established.
debug1: identity file /home/c824039/.ssh/identity type -1
debug1: identity file /home/c824039/.ssh/id_rsa type -1
debug3: Not a RSA1 key file /home/c824039/.ssh/id_dsa.
debug2: key_type_from_name: unknown key type '-----BEGIN'
debug3: key_read: missing keytype
debug2: key_type_from_name: unknown key type 'Proc-Type:'
debug3: key_read: missing keytype
debug2: key_type_from_name: unknown key type 'DEK-Info:'
debug3: key_read: missing keytype
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug3: key_read: missing whitespace
debug2: key_type_from_name: unknown key type '-----END'
debug3: key_read: missing keytype
debug1: identity file /home/c824039/.ssh/id_dsa type 2
debug1: Remote protocol version 1.99, remote software version OpenSSH_3.4p1
debug1: match: OpenSSH_3.4p1 pat
OpenSSH_3.2*,OpenSSH_3.3*,OpenSSH_3.4*,OpenSSH
3.5*
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_3.7.1p2
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug2: kex_parse_kexinit:
diffie-hellman-group-exchange-sha1,diffie-hellman-gr
up1-sha1
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
debug2: kex_parse_kexinit:
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour
aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes2
56-
tr
debug2: kex_parse_kexinit:
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour
aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes2
56-
tr
debug2: kex_parse_kexinit:
hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@ope
ssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit:
hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@ope
ssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2: kex_parse_kexinit:
diffie-hellman-group-exchange-sha1,diffie-hellman-gr
up1-sha1
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
debug2: kex_parse_kexinit:
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour
aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se
debug2: kex_parse_kexinit:
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour
aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se
debug2: kex_parse_kexinit:
hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@ope
ssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit:
hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@ope
ssh.com,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit: none,zlib
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2: mac_init: found hmac-md5
debug1: kex: server->client aes128-cbc hmac-md5 none
debug2: mac_init: found hmac-md5
debug1: kex: client->server aes128-cbc hmac-md5 none
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
debug2: dh_gen_key: priv key bits set: 136/256
debug2: bits set: 1596/3191
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
debug3: check_host_in_hostfile: filename /home/c824039/.ssh/known_hosts
debug3: check_host_in_hostfile: match line 5
debug3: check_host_in_hostfile: filename /home/c824039/.ssh/known_hosts
debug3: check_host_in_hostfile: match line 15
debug1: Host 'vuh245.in.telstra.com.au' is known and matches the RSA host
key.
debug1: Found key in /home/c824039/.ssh/known_hosts:5
debug2: bits set: 1616/3191
debug1: ssh_rsa_verify: signature correct
debug2: kex_derive_keys
debug2: set_newkeys: mode 1
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug2: set_newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: SSH2_MSG_SERVICE_REQUEST sent
debug2: service_accept: ssh-userauth
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug2: key: /home/c824039/.ssh/identity (0x0)
debug2: key: /home/c824039/.ssh/id_rsa (0x0)
debug2: key: /home/c824039/.ssh/id_dsa (0x100fd2f8)
debug1: Authentications that can continue:
publickey,password,keyboard-interact
ve
debug3: start over, passed a different list
publickey,password,keyboard-interac
ive
debug3: preferred publickey,keyboard-interactive,password
debug3: authmethod_lookup publickey
debug3: remaining preferred: keyboard-interactive,password
debug3: authmethod_is_enabled publickey
debug1: Next authentication method: publickey
debug1: Trying private key: /home/c824039/.ssh/identity
debug3: no such identity: /home/c824039/.ssh/identity
debug1: Trying private key: /home/c824039/.ssh/id_rsa
debug3: no such identity: /home/c824039/.ssh/id_rsa
debug1: Offering public key: /home/c824039/.ssh/id_dsa
debug3: send_pubkey_test
debug2: we sent a publickey packet, wait for reply
debug1: Server accepts key: pkalg ssh-dss blen 434
debug2: input_userauth_pk_ok: fp <stuff deleted>

debug3: sign_and_send_pubkey
debug1: PEM_read_PrivateKey failed
debug1: read PEM private key done: type <unknown>
Enter passphrase for key '/home/c824039/.ssh/id_dsa':
debug1: read PEM private key done: type DSA
debug1: Authentication succeeded (publickey).
debug1: channel 0: new [client-session]
debug3: ssh_session2_open: channel_new: 0
debug2: channel 0: send open
debug1: Entering interactive session.
debug2: callback start
debug2: ssh_session2_setup: id 0
debug1: Sending command: /usr/bin/X11/xterm
debug2: channel 0: request exec
debug2: callback done
debug2: channel 0: open confirm rwindow 0 rmax 32768
debug2: channel 0: rcvd adjust 131072
debug2: channel 0: rcvd ext data 7
debug2: channel 0: rcvd ext data 21
debug2: channel 0: rcvd ext data 24
debug2: channel 0: rcvd ext data 21
debug2: channel 0: rcvd eof
debug2: channel 0: output open -> drain
debug1: client_input_channel_req: channel 0 rtype exit-status reply 0
debug2: channel 0: rcvd close
debug2: channel 0: close_read
debug2: channel 0: input open -> closed
debug3: channel 0: will not send data after close
debug2: channel 0: obuf_empty delayed efd 6/(73)
Error: Can't open display:
Error: Couldn't find per display information
debug2: channel 0: written 73 to efd 6
debug3: channel 0: will not send data after close
debug2: channel 0: obuf empty
debug2: channel 0: close_write
debug2: channel 0: output drain -> closed
debug2: channel 0: almost dead
debug2: channel 0: gc: notify user
debug2: channel 0: gc: user detached
debug2: channel 0: send close
debug2: channel 0: is dead
debug2: channel 0: garbage collecting
debug1: channel 0: free: client-session, nchannels 1
debug3: channel 0: status: The following connections are open:
  #0 client-session (t4 r0 i3/0 o3/0 fd -1/-1)

debug3: channel 0: close_fds r -1 w -1 e 6
debug1: Transferred: stdin 0, stdout 0, stderr 0 bytes in 0.3 seconds
debug1: Bytes per second: stdin 0.0, stdout 0.0, stderr 0.0
debug1: Exit status 1

Adam.

>
> --
> Richard Silverman
> res@qoxp.net
>



Relevant Pages

  • openssh3.7p1 chroot patch not work on solaris 7
    ... debug1: monitor_child_preauth: test has been authenticated by privileged process ... debug3: mm_get_keystate: Waiting for new keys ... debug2: mac_init: found hmac-sha1 ... debug1: channel 0: new ...
    (comp.unix.solaris)
  • openssh3.7p1 chroot patch not work on solaris 7
    ... debug1: monitor_child_preauth: test has been authenticated by privileged process ... debug3: mm_get_keystate: Waiting for new keys ... debug2: mac_init: found hmac-sha1 ... debug1: channel 0: new ...
    (comp.security.ssh)
  • openssh3.7p1 chroot patch not work on solaris 7
    ... debug1: monitor_child_preauth: test has been authenticated by privileged process ... debug3: mm_get_keystate: Waiting for new keys ... debug2: mac_init: found hmac-sha1 ... debug1: channel 0: new ...
    (comp.security.ssh)
  • Problem with some user autentification error on sshd
    ... debug1: Reading configuration data /etc/ssh/ssh_config ... debug2: kex_parse_kexinit: none,zlib ... debug3: check_host_in_hostfile: match line 3 ... debug1: Next authentication method: keyboard-interactive ...
    (SSH)
  • Re: Public key Authentication broken under HP-UX?
    ... debug3: cipher ok: blowfish-cbc ... debug1: read PEM private key done: type DSA ... debug2: kex_parse_kexinit: ssh-dss ... debug1: channel 0: new ...
    (SSH)