Sie sind nicht angemeldet.

Lieber Besucher, herzlich willkommen bei: GentooForum.de. Falls dies Ihr erster Besuch auf dieser Seite ist, lesen Sie sich bitte die Hilfe durch. Dort wird Ihnen die Bedienung dieser Seite näher erläutert. Darüber hinaus sollten Sie sich registrieren, um alle Funktionen dieser Seite nutzen zu können. Benutzen Sie das Registrierungsformular, um sich zu registrieren oder informieren Sie sich ausführlich über den Registrierungsvorgang. Falls Sie sich bereits zu einem früheren Zeitpunkt registriert haben, können Sie sich hier anmelden.

1

06.01.2014, 22:41

Verbinden mit SFTP auf neuen openssh 6.4_p1-r1 nicht möglich.

Ich habe zwei Server mit Gentoo hardened und bei beiden habe ich ein seltsames Problem, seit der neuen openssh Version net-misc/openssh 6.4_p1-r1. Ich kann Mich zwar normal mit ssh verbinden aber sobald ich versuche mit sftp über Dolphin oder Konqueror zu verbinden, geht es einfach nicht. Meldung in Dolphin:
"Das SFTP Subsystem kann nicht angefordert werden. Bitte stellen Sie sicher, das SFTP auf dem Zielserver aktiviert ist."

Wenn ich über die Konsole mit sftp versuche, geht es aber problemlos anscheinend!

Log vom Server:

Quellcode

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
Jan 6 22:05:31 server sshd[26393]: debug3: fd 4 is not O_NONBLOCK
Jan 6 22:05:31 server sshd[26393]: debug1: Forked child 26732.
Jan 6 22:05:31 server sshd[26393]: debug3: send_rexec_state: entering fd = 7 config len 659
Jan 6 22:05:31 server sshd[26393]: debug3: ssh_msg_send: type 0
Jan 6 22:05:31 server sshd[26393]: debug3: send_rexec_state: done
Jan 6 22:05:31 server sshd[26732]: debug3: oom_adjust_restore
Jan 6 22:05:31 server sshd[26732]: Set /proc/self/oom_score_adj to 0
Jan 6 22:05:31 server sshd[26732]: debug1: rexec start in 4 out 4 newsock 4 pipe 6 sock 7
Jan 6 22:05:31 server sshd[26732]: debug1: inetd sockets after dupping: 3, 3
Jan 6 22:05:31 server sshd[26732]: Connection from 123.113.2.12 port 47694
Jan 6 22:05:31 server sshd[26732]: debug1: HPN Disabled: 0, HPN Buffer Size: 87380
Jan 6 22:05:31 server sshd[26732]: debug1: Client protocol version 2.0; client software version libssh-0.5.5
Jan 6 22:05:31 server sshd[26732]: SSH: Server;Ltype: Version;Remote: 123.113.2.12-47694;Protocol: 2.0;Client: libssh-0.5.5
Jan 6 22:05:31 server sshd[26732]: debug1: no match: libssh-0.5.5
Jan 6 22:05:31 server sshd[26732]: debug1: Enabling compatibility mode for protocol 2.0
Jan 6 22:05:31 server sshd[26732]: debug1: Local version string SSH-2.0-OpenSSH_6.4p1-hpn14v2
Jan 6 22:05:31 server sshd[26732]: debug2: fd 3 setting O_NONBLOCK
Jan 6 22:05:31 server sshd[26732]: debug3: ssh_sandbox_init: preparing seccomp filter sandbox
Jan 6 22:05:31 server sshd[26732]: debug2: Network child is on pid 26735
Jan 6 22:05:31 server sshd[26732]: debug3: preauth child monitor started
Jan 6 22:05:31 server sshd[26732]: debug3: privsep user:group 22:22 [preauth]
Jan 6 22:05:31 server sshd[26732]: debug1: permanently_set_uid: 22/22 [preauth]
Jan 6 22:05:31 server sshd[26732]: debug3: ssh_sandbox_child: setting PR_SET_NO_NEW_PRIVS [preauth]
Jan 6 22:05:31 server sshd[26732]: debug3: ssh_sandbox_child: attaching seccomp filter program [preauth]
Jan 6 22:05:31 server sshd[26732]: debug1: MYFLAG IS 1 [preauth]
Jan 6 22:05:31 server sshd[26732]: debug1: list_hostkey_types: ssh-rsa [preauth]
Jan 6 22:05:31 server sshd[26732]: debug1: SSH2_MSG_KEXINIT sent [preauth]
Jan 6 22:05:31 server sshd[26732]: debug1: SSH2_MSG_KEXINIT received [preauth]
Jan 6 22:05:31 server sshd[26732]: debug1: AUTH STATE IS 0 [preauth]
Jan 6 22:05:31 server sshd[26732]: debug2: kex_parse_kexinit: ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 [preauth]
Jan 6 22:05:31 server sshd[26732]: debug2: kex_parse_kexinit: ssh-rsa [preauth]
Jan 6 22:05:31 server sshd[26732]: debug2: kex_parse_kexinit: aes256-ctr,aes192-ctr,aes128-ctr,arcfour256,aes128-cbc [preauth]
Jan 6 22:05:31 server sshd[26732]: debug2: kex_parse_kexinit: aes256-ctr,aes192-ctr,aes128-ctr,arcfour256,aes128-cbc [preauth]
Jan 6 22:05:31 server sshd[26732]: debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 [preauth]
Jan 6 22:05:31 server sshd[26732]: debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 [preauth]
Jan 6 22:05:31 server sshd[26732]: debug2: kex_parse_kexinit: none,zlib@openssh.com [preauth]
Jan 6 22:05:31 server sshd[26732]: debug2: kex_parse_kexinit: none,zlib@openssh.com [preauth]
Jan 6 22:05:31 server sshd[26732]: debug2: kex_parse_kexinit: [preauth]
Jan 6 22:05:31 server sshd[26732]: debug2: kex_parse_kexinit: [preauth]
Jan 6 22:05:31 server sshd[26732]: debug2: kex_parse_kexinit: first_kex_follows 0 [preauth]
Jan 6 22:05:31 server sshd[26732]: debug2: kex_parse_kexinit: reserved 0 [preauth]
Jan 6 22:05:31 server sshd[26732]: debug2: kex_parse_kexinit: diffie-hellman-group1-sha1 [preauth]
Jan 6 22:05:31 server sshd[26732]: debug2: kex_parse_kexinit: ssh-rsa [preauth]
Jan 6 22:05:31 server sshd[26732]: debug2: kex_parse_kexinit: aes256-ctr [preauth]
Jan 6 22:05:31 server sshd[26732]: debug2: kex_parse_kexinit: aes256-ctr [preauth]
Jan 6 22:05:31 server sshd[26732]: debug2: kex_parse_kexinit: hmac-sha1 [preauth]
Jan 6 22:05:31 server sshd[26732]: debug2: kex_parse_kexinit: hmac-sha1 [preauth]
Jan 6 22:05:31 server sshd[26732]: debug2: kex_parse_kexinit: zlib@openssh.com [preauth]
Jan 6 22:05:31 server sshd[26732]: debug2: kex_parse_kexinit: zlib@openssh.com [preauth]
Jan 6 22:05:31 server sshd[26732]: debug2: kex_parse_kexinit: [preauth]
Jan 6 22:05:31 server sshd[26732]: debug2: kex_parse_kexinit: [preauth]
Jan 6 22:05:31 server sshd[26732]: debug2: kex_parse_kexinit: first_kex_follows 0 [preauth]
Jan 6 22:05:31 server sshd[26732]: debug2: kex_parse_kexinit: reserved 0 [preauth]
Jan 6 22:05:31 server sshd[26732]: debug2: mac_setup: found hmac-sha1 [preauth]
Jan 6 22:05:31 server sshd[26732]: debug1: REQUESTED ENC.NAME is 'aes256-ctr' [preauth]
Jan 6 22:05:31 server sshd[26732]: debug1: kex: client->server aes256-ctr hmac-sha1 zlib@openssh.com [preauth]
Jan 6 22:05:31 server sshd[26732]: SSH: Server;Ltype: Kex;Remote: 123.113.2.12-47694;Enc: aes256-ctr;MAC: hmac-sha1;Comp: zlib@openssh.com [preauth]
Jan 6 22:05:31 server sshd[26732]: debug2: mac_setup: found hmac-sha1 [preauth]
Jan 6 22:05:31 server sshd[26732]: debug1: REQUESTED ENC.NAME is 'aes256-ctr' [preauth]
Jan 6 22:05:31 server sshd[26732]: debug1: kex: server->client aes256-ctr hmac-sha1 zlib@openssh.com [preauth]
Jan 6 22:05:31 server sshd[26732]: debug2: dh_gen_key: priv key bits set: 261/512 [preauth]
Jan 6 22:05:31 server sshd[26732]: debug2: bits set: 495/1024 [preauth]
Jan 6 22:05:31 server sshd[26732]: debug1: expecting SSH2_MSG_KEXDH_INIT [preauth]
Jan 6 22:05:31 server sshd[26732]: debug2: bits set: 532/1024 [preauth]
Jan 6 22:05:31 server sshd[26732]: debug3: mm_key_sign entering [preauth]
Jan 6 22:05:31 server sshd[26732]: debug3: mm_request_send entering: type 6 [preauth]
Jan 6 22:05:31 server sshd[26732]: debug3: mm_key_sign: waiting for MONITOR_ANS_SIGN [preauth]
Jan 6 22:05:31 server sshd[26732]: debug3: mm_request_receive_expect entering: type 7 [preauth]
Jan 6 22:05:31 server sshd[26732]: debug3: mm_request_receive entering [preauth]
Jan 6 22:05:31 server sshd[26732]: debug3: mm_request_receive entering
Jan 6 22:05:31 server sshd[26732]: debug3: monitor_read: checking request 6
Jan 6 22:05:31 server sshd[26732]: debug3: mm_answer_sign
Jan 6 22:05:31 server sshd[26732]: debug3: mm_answer_sign: signature 0x6135b3dd00(1039)
Jan 6 22:05:31 server sshd[26732]: debug3: mm_request_send entering: type 7
Jan 6 22:05:31 server sshd[26732]: debug2: monitor_read: 6 used once, disabling now
Jan 6 22:05:31 server sshd[26732]: debug2: kex_derive_keys [preauth]
Jan 6 22:05:31 server sshd[26732]: debug2: set_newkeys: mode 1 [preauth]
Jan 6 22:05:31 server sshd[26732]: debug1: SSH2_MSG_NEWKEYS sent [preauth]
Jan 6 22:05:31 server sshd[26732]: debug1: expecting SSH2_MSG_NEWKEYS [preauth]
Jan 6 22:05:31 server sshd[26732]: debug2: set_newkeys: mode 0 [preauth]
Jan 6 22:05:31 server sshd[26732]: debug1: SSH2_MSG_NEWKEYS received [preauth]
Jan 6 22:05:31 server sshd[26732]: debug1: KEX done [preauth]
Jan 6 22:05:31 server sshd[26732]: debug1: userauth-request for user sshuser service ssh-connection method none [preauth]
Jan 6 22:05:31 server sshd[26732]: SSH: Server;Ltype: Authname;Remote: -47694;Name: sshuser [preauth]
Jan 6 22:05:31 server sshd[26732]: debug1: attempt 0 failures 0 [preauth]
Jan 6 22:05:31 server sshd[26732]: debug3: mm_getpwnamallow entering [preauth]
Jan 6 22:05:31 server sshd[26732]: debug3: mm_request_send entering: type 8 [preauth]
Jan 6 22:05:31 server sshd[26732]: debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM [preauth]
Jan 6 22:05:31 server sshd[26732]: debug3: mm_request_receive_expect entering: type 9 [preauth]
Jan 6 22:05:31 server sshd[26732]: debug3: mm_request_receive entering [preauth]
Jan 6 22:05:31 server sshd[26732]: debug3: mm_request_receive entering
Jan 6 22:05:31 server sshd[26732]: debug3: monitor_read: checking request 8
Jan 6 22:05:31 server sshd[26732]: debug3: mm_answer_pwnamallow
Jan 6 22:05:31 server sshd[26732]: debug3: Trying to reverse map address 123.113.2.12.
Jan 6 22:05:31 server sshd[26732]: debug2: parse_server_config: config reprocess config len 659
Jan 6 22:05:31 server sshd[26732]: debug1: Config token is hostkey
Jan 6 22:05:31 server sshd[26732]: debug1: Config token is port
Jan 6 22:05:31 server sshd[26732]: debug1: Config token is listenaddress
Jan 6 22:05:31 server sshd[26732]: debug1: Config token is ciphers
Jan 6 22:05:31 server sshd[26732]: debug1: Config token is loglevel
Jan 6 22:05:31 server sshd[26732]: debug1: Config token is logingracetime
Jan 6 22:05:31 server sshd[26732]: debug1: Config token is permitrootlogin
Jan 6 22:05:31 server sshd[26732]: debug1: Config token is strictmodes
Jan 6 22:05:31 server sshd[26732]: debug1: Config token is maxauthtries
Jan 6 22:05:31 server sshd[26732]: debug1: Config token is maxsessions
Jan 6 22:05:31 server sshd[26732]: debug1: Config token is rsaauthentication
Jan 6 22:05:31 server sshd[26732]: debug1: Config token is pubkeyauthentication
Jan 6 22:05:31 server sshd[26732]: debug1: Config token is passwordauthentication
Jan 6 22:05:31 server sshd[26732]: debug1: Config token is permitemptypasswords
Jan 6 22:05:31 server sshd[26732]: debug1: Config token is usepam
Jan 6 22:05:31 server sshd[26732]: debug1: Config token is printmotd
Jan 6 22:05:31 server sshd[26732]: debug1: Config token is printlastlog
Jan 6 22:05:31 server sshd[26732]: debug1: Config token is useprivilegeseparation
Jan 6 22:05:31 server sshd[26732]: debug1: Config token is subsystem
Jan 6 22:05:31 server sshd[26732]: debug1: Config token is acceptenv
Jan 6 22:05:31 server sshd[26732]: debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1
Jan 6 22:05:31 server sshd[26732]: debug3: mm_request_send entering: type 9
Jan 6 22:05:31 server sshd[26732]: debug2: monitor_read: 8 used once, disabling now
Jan 6 22:05:31 server sshd[26732]: debug2: input_userauth_request: setting up authctxt for sshuser [preauth]
Jan 6 22:05:31 server sshd[26732]: debug3: mm_start_pam entering [preauth]
Jan 6 22:05:31 server sshd[26732]: debug3: mm_request_send entering: type 100 [preauth]
Jan 6 22:05:31 server sshd[26732]: debug3: mm_inform_authserv entering [preauth]
Jan 6 22:05:31 server sshd[26732]: debug3: mm_request_send entering: type 4 [preauth]
Jan 6 22:05:31 server sshd[26732]: debug2: input_userauth_request: try method none [preauth]
Jan 6 22:05:31 server sshd[26732]: debug3: userauth_finish: failure partial=0 next methods="publickey,keyboard-interactive" [preauth]
Jan 6 22:05:31 server sshd[26732]: debug3: mm_request_receive entering
Jan 6 22:05:31 server sshd[26732]: debug3: monitor_read: checking request 100
Jan 6 22:05:31 server sshd[26732]: debug1: PAM: initializing for "sshuser"
Jan 6 22:05:31 server sshd[26732]: debug1: PAM: setting PAM_RHOST to "pd9e21272.dip0.t-ipconnect.de"
Jan 6 22:05:31 server sshd[26732]: debug1: PAM: setting PAM_TTY to "ssh"
Jan 6 22:05:31 server sshd[26732]: debug2: monitor_read: 100 used once, disabling now
Jan 6 22:05:31 server sshd[26732]: debug3: mm_request_receive entering
Jan 6 22:05:31 server sshd[26732]: debug3: monitor_read: checking request 4
Jan 6 22:05:31 server sshd[26732]: debug3: mm_answer_authserv: service=ssh-connection, style=
Jan 6 22:05:31 server sshd[26732]: debug2: monitor_read: 4 used once, disabling now
Jan 6 22:05:31 server sshd[26732]: debug1: userauth-request for user sshuser service ssh-connection method publickey [preauth]
Jan 6 22:05:31 server sshd[26732]: debug1: attempt 1 failures 0 [preauth]
Jan 6 22:05:31 server sshd[26732]: debug2: input_userauth_request: try method publickey [preauth]
Jan 6 22:05:31 server sshd[26732]: debug3: key_from_blob(..., 2071) [preauth]
Jan 6 22:05:31 server sshd[26732]: debug3: x509_from_blob: read X509 from BIO fail error:0D0680A8:lib(13):func(104):reason(168) [preauth]
Jan 6 22:05:31 server sshd[26732]: debug3: x509key_from_blob: no X.509 certificate data [preauth]
Jan 6 22:05:31 server sshd[26732]: debug3: key_from_blob(..., ...) ktype=ssh-rsa [preauth]
Jan 6 22:05:31 server sshd[26732]: debug1: test whether pkalg/pkblob are acceptable [preauth]
Jan 6 22:05:31 server sshd[26732]: debug3: mm_key_allowed entering [preauth]
Jan 6 22:05:31 server sshd[26732]: debug3: mm_request_send entering: type 22 [preauth]
Jan 6 22:05:31 server sshd[26732]: debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED [preauth]
Jan 6 22:05:31 server sshd[26732]: debug3: mm_request_receive_expect entering: type 23 [preauth]
Jan 6 22:05:31 server sshd[26732]: debug3: mm_request_receive entering [preauth]
Jan 6 22:05:31 server sshd[26732]: debug3: mm_request_receive entering
Jan 6 22:05:31 server sshd[26732]: debug3: monitor_read: checking request 22
Jan 6 22:05:31 server sshd[26732]: debug3: mm_answer_keyallowed entering
Jan 6 22:05:31 server sshd[26732]: debug3: key_from_blob(..., 2071)
Jan 6 22:05:31 server sshd[26732]: debug3: x509_from_blob: read X509 from BIO fail error:0D0680A8:lib(13):func(104):reason(168)
Jan 6 22:05:31 server sshd[26732]: debug3: x509key_from_blob: no X.509 certificate data
Jan 6 22:05:31 server sshd[26732]: debug3: key_from_blob(..., ...) ktype=ssh-rsa
Jan 6 22:05:31 server sshd[26732]: debug3: mm_answer_keyallowed: key_from_blob: 0x6135b474c0
Jan 6 22:05:31 server sshd[26732]: debug1: temporarily_use_uid: 1000/1000 (e=0/0)
Jan 6 22:05:31 server sshd[26732]: debug1: trying public key file /home/sshuser/.ssh/authorized_keys
Jan 6 22:05:31 server sshd[26732]: debug1: fd 4 clearing O_NONBLOCK
Jan 6 22:05:31 server sshd[26732]: debug3: x509key_from_subject: 1 is not x509 key
Jan 6 22:05:31 server sshd[26732]: debug3: key_from_blob(..., 2071)
Jan 6 22:05:31 server sshd[26732]: debug3: x509_from_blob: read X509 from BIO fail error:0D0680A8:lib(13):func(104):reason(168)
Jan 6 22:05:31 server sshd[26732]: debug3: x509key_from_blob: no X.509 certificate data
Jan 6 22:05:31 server sshd[26732]: debug3: key_from_blob(..., ...) ktype=ssh-rsa
Jan 6 22:05:31 server sshd[26732]: debug1: matching key found: file /home/sshuser/.ssh/authorized_keys, line 1 RSA a1:7c:9a:96:48:f9:1e:cb:02:70:77:3e:69:09:8d:44
Jan 6 22:05:31 server sshd[26732]: debug1: restore_uid: 0/0
Jan 6 22:05:31 server sshd[26732]: debug3: mm_answer_keyallowed: key 0x6135b474c0 is allowed
Jan 6 22:05:31 server sshd[26732]: debug3: mm_request_send entering: type 23
Jan 6 22:05:31 server sshd[26732]: debug2: userauth_pubkey: authenticated 0 pkalg ssh-rsa [preauth]
Jan 6 22:05:31 server sshd[26732]: Postponed publickey for sshuser from 123.113.2.12 port 47694 ssh2 [preauth]
Jan 6 22:05:33 server sshd[26732]: debug1: userauth-request for user sshuser service ssh-connection method publickey [preauth]
Jan 6 22:05:33 server sshd[26732]: debug1: attempt 2 failures 0 [preauth]
Jan 6 22:05:33 server sshd[26732]: debug2: input_userauth_request: try method publickey [preauth]
Jan 6 22:05:33 server sshd[26732]: debug3: key_from_blob(..., 2071) [preauth]
Jan 6 22:05:33 server sshd[26732]: debug3: x509_from_blob: read X509 from BIO fail error:0D0680A8:lib(13):func(104):reason(168) [preauth]
Jan 6 22:05:33 server sshd[26732]: debug3: x509key_from_blob: no X.509 certificate data [preauth]
Jan 6 22:05:33 server sshd[26732]: debug3: key_from_blob(..., ...) ktype=ssh-rsa [preauth]
Jan 6 22:05:33 server sshd[26732]: debug3: mm_key_allowed entering [preauth]
Jan 6 22:05:33 server sshd[26732]: debug3: mm_request_send entering: type 22 [preauth]
Jan 6 22:05:33 server sshd[26732]: debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED [preauth]
Jan 6 22:05:33 server sshd[26732]: debug3: mm_request_receive_expect entering: type 23 [preauth]
Jan 6 22:05:33 server sshd[26732]: debug3: mm_request_receive entering [preauth]
Jan 6 22:05:33 server sshd[26732]: debug3: mm_request_receive entering
Jan 6 22:05:33 server sshd[26732]: debug3: monitor_read: checking request 22
Jan 6 22:05:33 server sshd[26732]: debug3: mm_answer_keyallowed entering
Jan 6 22:05:33 server sshd[26732]: debug3: key_from_blob(..., 2071)
Jan 6 22:05:33 server sshd[26732]: debug3: x509_from_blob: read X509 from BIO fail error:0D0680A8:lib(13):func(104):reason(168)
Jan 6 22:05:33 server sshd[26732]: debug3: x509key_from_blob: no X.509 certificate data
Jan 6 22:05:33 server sshd[26732]: debug3: key_from_blob(..., ...) ktype=ssh-rsa
Jan 6 22:05:33 server sshd[26732]: debug3: mm_answer_keyallowed: key_from_blob: 0x6135b47610
Jan 6 22:05:33 server sshd[26732]: debug1: temporarily_use_uid: 1000/1000 (e=0/0)
Jan 6 22:05:33 server sshd[26732]: debug1: trying public key file /home/sshuser/.ssh/authorized_keys
Jan 6 22:05:33 server sshd[26732]: debug1: fd 4 clearing O_NONBLOCK
Jan 6 22:05:33 server sshd[26732]: debug3: x509key_from_subject: 1 is not x509 key
Jan 6 22:05:33 server sshd[26732]: debug3: key_from_blob(..., 2071)
Jan 6 22:05:33 server sshd[26732]: debug3: x509_from_blob: read X509 from BIO fail error:0D0680A8:lib(13):func(104):reason(168)
Jan 6 22:05:33 server sshd[26732]: debug3: x509key_from_blob: no X.509 certificate data
Jan 6 22:05:33 server sshd[26732]: debug3: key_from_blob(..., ...) ktype=ssh-rsa
Jan 6 22:05:33 server sshd[26732]: debug1: matching key found: file /home/sshuser/.ssh/authorized_keys, line 1 RSA a1:7c:9a:96:48:f9:1e:cb:02:70:77:3e:69:09:8d:44
Jan 6 22:05:33 server sshd[26732]: debug1: restore_uid: 0/0
Jan 6 22:05:33 server sshd[26732]: debug3: mm_answer_keyallowed: key 0x6135b47610 is allowed
Jan 6 22:05:33 server sshd[26732]: debug3: mm_request_send entering: type 23
Jan 6 22:05:33 server sshd[26732]: debug3: mm_key_verify entering [preauth]
Jan 6 22:05:33 server sshd[26732]: debug3: mm_request_send entering: type 24 [preauth]
Jan 6 22:05:33 server sshd[26732]: debug3: mm_key_verify: waiting for MONITOR_ANS_KEYVERIFY [preauth]
Jan 6 22:05:33 server sshd[26732]: debug3: mm_request_receive_expect entering: type 25 [preauth]
Jan 6 22:05:33 server sshd[26732]: debug3: mm_request_receive entering [preauth]
Jan 6 22:05:33 server sshd[26732]: debug3: mm_request_receive entering
Jan 6 22:05:33 server sshd[26732]: debug3: monitor_read: checking request 24
Jan 6 22:05:33 server sshd[26732]: debug3: key_from_blob(..., 2071)
Jan 6 22:05:33 server sshd[26732]: debug3: x509_from_blob: read X509 from BIO fail error:0D0680A8:lib(13):func(104):reason(168)
Jan 6 22:05:33 server sshd[26732]: debug3: x509key_from_blob: no X.509 certificate data
Jan 6 22:05:33 server sshd[26732]: debug3: key_from_blob(..., ...) ktype=ssh-rsa
Jan 6 22:05:33 server sshd[26732]: debug1: ssh_rsa_verify: signature correct
Jan 6 22:05:33 server sshd[26732]: debug3: mm_answer_keyverify: key 0x6135b47610 signature verified
Jan 6 22:05:33 server sshd[26732]: debug3: mm_request_send entering: type 25
Jan 6 22:05:33 server sshd[26732]: debug3: mm_request_receive_expect entering: type 102
Jan 6 22:05:33 server sshd[26732]: debug3: mm_request_receive entering
Jan 6 22:05:33 server sshd[26732]: debug1: do_pam_account: called
Jan 6 22:05:33 server sshd[26732]: debug3: PAM: do_pam_account pam_acct_mgmt = 0 (Success)
Jan 6 22:05:33 server sshd[26732]: debug3: mm_request_send entering: type 103
Jan 6 22:05:33 server sshd[26732]: Accepted publickey for sshuser from 123.113.2.12 port 47694 ssh2: RSA a1:7c:9a:96:48:f9:1e:cb:02:70:77:3e:69:09:8d:44
Jan 6 22:05:33 server sshd[26732]: debug1: monitor_child_preauth: sshuser has been authenticated by privileged process
Jan 6 22:05:33 server sshd[26732]: debug3: mm_get_keystate: Waiting for new keys
Jan 6 22:05:33 server sshd[26732]: debug3: mm_request_receive_expect entering: type 26
Jan 6 22:05:33 server sshd[26732]: debug3: mm_request_receive entering
Jan 6 22:05:33 server sshd[26732]: debug3: mm_newkeys_from_blob: 0x6135b4e6e0(155)
Jan 6 22:05:33 server sshd[26732]: debug2: mac_setup: found hmac-sha1
Jan 6 22:05:33 server sshd[26732]: debug3: mm_get_keystate: Waiting for second key
Jan 6 22:05:33 server sshd[26732]: debug3: mm_newkeys_from_blob: 0x6135b4e6e0(155)
Jan 6 22:05:33 server sshd[26732]: debug2: mac_setup: found hmac-sha1
Jan 6 22:05:33 server sshd[26732]: debug3: mm_get_keystate: Getting compression state
Jan 6 22:05:33 server sshd[26732]: debug3: mm_get_keystate: Getting Network I/O buffers
Jan 6 22:05:33 server sshd[26732]: debug2: userauth_pubkey: authenticated 1 pkalg ssh-rsa [preauth]
Jan 6 22:05:33 server sshd[26732]: debug3: mm_do_pam_account entering [preauth]
Jan 6 22:05:33 server sshd[26732]: debug3: mm_request_send entering: type 102 [preauth]
Jan 6 22:05:33 server sshd[26732]: debug3: mm_request_receive_expect entering: type 103 [preauth]
Jan 6 22:05:33 server sshd[26732]: debug3: mm_request_receive entering [preauth]
Jan 6 22:05:33 server sshd[26732]: debug3: mm_do_pam_account returning 1 [preauth]
Jan 6 22:05:33 server sshd[26732]: debug1: Enabling compression at level 6. [preauth]
Jan 6 22:05:33 server sshd[26732]: debug3: mm_send_keystate: Sending new keys: 0x6135b3f270 0x6135b3f050 [preauth]
Jan 6 22:05:33 server sshd[26732]: debug3: mm_newkeys_to_blob: converting 0x6135b3f270 [preauth]
Jan 6 22:05:33 server sshd[26732]: debug3: mm_newkeys_to_blob: converting 0x6135b3f050 [preauth]
Jan 6 22:05:33 server sshd[26732]: debug3: mm_send_keystate: New keys have been sent [preauth]
Jan 6 22:05:33 server sshd[26732]: debug3: mm_send_keystate: Sending compression state [preauth]
Jan 6 22:05:33 server sshd[26732]: debug3: mm_request_send entering: type 26 [preauth]
Jan 6 22:05:33 server sshd[26732]: debug3: mm_send_keystate: Finished sending state [preauth]
Jan 6 22:05:33 server sshd[26732]: debug1: monitor_read_log: child log fd closed
Jan 6 22:05:33 server sshd[26732]: debug3: mm_share_sync: Share sync
Jan 6 22:05:33 server sshd[26732]: debug3: mm_share_sync: Share sync end
Jan 6 22:05:33 server sshd[26732]: debug3: ssh_sandbox_parent_finish: finished
Jan 6 22:05:33 server sshd[26732]: debug1: PAM: establishing credentials
Jan 6 22:05:33 server sshd[26732]: debug3: PAM: opening session
Jan 6 22:05:33 server sshd[26732]: pam_loginuid(sshd:session): set_loginuid failed
Jan 6 22:05:33 server sshd[26732]: pam_unix(sshd:session): session opened for user sshuser by (uid=0)
Jan 6 22:05:33 server sshd[26732]: User child is on pid 26736
Jan 6 22:05:33 server sshd[26736]: debug1: PAM: establishing credentials
Jan 6 22:05:33 server sshd[26736]: debug1: permanently_set_uid: 1000/1000
Jan 6 22:05:33 server sshd[26736]: debug2: set_newkeys: mode 0
Jan 6 22:05:33 server sshd[26736]: debug2: set_newkeys: mode 1
Jan 6 22:05:33 server sshd[26736]: debug1: Single to Multithreaded CTR cipher swap - server request
Jan 6 22:05:33 server sshd[26736]: debug1: Entering interactive session for SSH2.
Jan 6 22:05:33 server sshd[26736]: debug2: fd 4 setting O_NONBLOCK
Jan 6 22:05:33 server sshd[26736]: debug2: fd 6 setting O_NONBLOCK
Jan 6 22:05:33 server sshd[26736]: debug1: server_init_dispatch_20
Jan 6 22:05:33 server sshd[26736]: debug1: need rekeying
Jan 6 22:05:33 server sshd[26736]: debug1: SSH2_MSG_KEXINIT sent
Jan 6 22:05:33 server sshd[26736]: debug1: server_input_channel_open: ctype session rchan 43 win 64000 max 32768
Jan 6 22:05:33 server sshd[26736]: debug1: input_session_request
Jan 6 22:05:33 server sshd[26736]: debug1: channel 0: new [server-session]
Jan 6 22:05:33 server sshd[26736]: debug2: session_new: allocate (allocated 0 max 10)
Jan 6 22:05:33 server sshd[26736]: debug3: session_unused: session id 0 unused
Jan 6 22:05:33 server sshd[26736]: debug1: session_new: session 0
Jan 6 22:05:33 server sshd[26736]: debug1: session_open: channel 0
Jan 6 22:05:33 server sshd[26736]: debug1: session_open: session 0: link with channel 0
Jan 6 22:05:33 server sshd[26736]: debug1: server_input_channel_open: confirm session
Jan 6 22:05:33 server sshd[26736]: debug1: enqueue packet: 91
Jan 6 22:05:33 server sshd[26736]: Received disconnect from 123.113.2.12: 11: Bye Bye
Jan 6 22:05:33 server sshd[26736]: debug1: do_cleanup
Jan 6 22:05:33 server sshd[26736]: debug3: PAM: sshpam_thread_cleanup entering
Jan 6 22:05:33 server sshd[26732]: debug3: mm_request_receive entering
Jan 6 22:05:33 server sshd[26732]: debug1: do_cleanup
Jan 6 22:05:33 server sshd[26732]: debug1: PAM: cleanup
Jan 6 22:05:33 server sshd[26732]: debug1: PAM: closing session
Jan 6 22:05:33 server sshd[26732]: pam_unix(sshd:session): session closed for user sshuser
Jan 6 22:05:33 server sshd[26732]: debug1: PAM: deleting credentials
Jan 6 22:05:33 server sshd[26732]: debug3: PAM: sshpam_thread_cleanup entering

Dieser Beitrag wurde bereits 1 mal editiert, zuletzt von »atze« (09.01.2014, 16:15)


2

07.01.2014, 14:50

https://bugs.gentoo.org/show_bug.cgi?id=497398 ... hänge dich dran (wenn du nicht selbst schon der bugreporter bist)
http://www.dyle.org
IM-Account (Jabber!) sind auf meiner HP ...
There is no place like /home

http://www.gentooforum.de
http://www.gentoofreunde.org

<div>how to annoy a web developer?</span>

3

07.01.2014, 18:17

Richtig, Danke, das ist mein Bug Report.

Vielleicht hätte Ich es sofort hier verlinken sollen..

4

08.01.2014, 06:42

Der Bug scheint schon bekannt zu sein ... und es kümmern sich bereits Devs darum: https://bugs.gentoo.org/show_bug.cgi?id=481616
http://www.dyle.org
IM-Account (Jabber!) sind auf meiner HP ...
There is no place like /home

http://www.gentooforum.de
http://www.gentoofreunde.org

<div>how to annoy a web developer?</span>

5

09.01.2014, 16:14

Die Lösung ist, zumindest vorläufig, in den useflags hpn abzuschalten.

Also ufed starten oder direkt in make.conf -hpn (high performance ssh) eintragen. Das ist wohl beim hardened Profil standardmäßig aktiviert.