[BlueOnyx:03609] Re: ssh hangs after password
Gerald Waugh
gwaugh at raqware.com
Wed Feb 17 11:56:44 -05 2010
On Wed, 2010-02-17 at 11:42 -0600, Chuck Tetlow wrote:
> Have you tried waiting a while? It may be a reverse DNS lookup is
> failing (trying to get a name to log the connection). In which case,
> it will respond and let you in when it finally times out. I believe
> the default timeout is 45 seconds. But I've seen some hang as long as
> two/three minutes.
No, I have waited hours, and have to close the session manually
>
> Chuck
>
>
> ---------- Original Message -----------
> From: Gerald Waugh <gwaugh at raqware.com>
> To: coba-e <coba-e at bluequartz.org>, BlueOnyx General Mailing List
> <blueonyx at blueonyx.it>
> Sent: Wed, 17 Feb 2010 11:15:38 -0500
> Subject: [BlueOnyx:03606] ssh hangs after password
>
> > Excuse the cross post, looking for an answer.
> > ssh into the server, enter password, and hangs.
> > Tried with putty and a Linux PC terminal session,
> >
> > Can't even ^C out, have to close the terminal session.
> > here is a debug output of the connection.
> >
> > >[root at s3 ~]# ssh -vvv -p20200 admin at s5.inscomp.net
> > >OpenSSH_3.9p1, OpenSSL 0.9.7a Feb 19 2003
> > >debug1: Reading configuration data /etc/ssh/ssh_config
> > >debug1: Applying options for *
> > >debug2: ssh_connect: needpriv 0
> > >debug1: Connecting to s5.inscomp.net [66.121.54.249] port 20200.
> > >debug1: Connection established.
> > >debug1: permanently_set_uid: 0/0
> > >debug1: identity file /root/.ssh/identity type -1
> > >debug1: identity file /root/.ssh/id_rsa type -1
> > >debug1: identity file /root/.ssh/id_dsa type -1
> > >debug1: Remote protocol version 2.0, remote software version
> > >OpenSSH_3.9p1
> > >debug1: match: OpenSSH_3.9p1 pat OpenSSH*
> > >debug1: Enabling compatibility mode for protocol 2.0
> > >debug1: Local version string SSH-2.0-OpenSSH_3.9p1
> > >debug2: fd 3 setting O_NONBLOCK
> > >debug1: SSH2_MSG_KEXINIT sent
> > >debug1: SSH2_MSG_KEXINIT received
> > >debug2: kex_parse_kexinit:
> >
> >diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
> > >debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
> > >debug2: kex_parse_kexinit:
> >
> >aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc at lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
> > >debug2: kex_parse_kexinit:
> >
> >aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc at lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
> > >debug2: kex_parse_kexinit:
> >
> >hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
> > >debug2: kex_parse_kexinit:
> >
> >hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
> > >debug2: kex_parse_kexinit: none,zlib
> > >debug2: kex_parse_kexinit: none,zlib
> > >debug2: kex_parse_kexinit:
> > >debug2: kex_parse_kexinit:
> > >debug2: kex_parse_kexinit: first_kex_follows 0
> > >debug2: kex_parse_kexinit: reserved 0
> > >debug2: kex_parse_kexinit:
> >
> >diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
> > >debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
> > >debug2: kex_parse_kexinit:
> >
> >aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc at lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
> > >debug2: kex_parse_kexinit:
> >
> >aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc at lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
> > >debug2: kex_parse_kexinit:
> >
> >hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
> > >debug2: kex_parse_kexinit:
> >
> >hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
> > >debug2: kex_parse_kexinit: none,zlib
> > >debug2: kex_parse_kexinit: none,zlib
> > >debug2: kex_parse_kexinit:
> > >debug2: kex_parse_kexinit:
> > >debug2: kex_parse_kexinit: first_kex_follows 0
> > >debug2: kex_parse_kexinit: reserved 0
> > >debug2: mac_init: found hmac-md5
> > >debug1: kex: server->client aes128-cbc hmac-md5 none
> > >debug2: mac_init: found hmac-md5
> > >debug1: kex: client->server aes128-cbc hmac-md5 none
> > >debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent
> > >debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
> > >debug2: dh_gen_key: priv key bits set: 124/256
> > >debug2: bits set: 513/1024
> > >debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
> > >debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
> > >debug3: check_host_in_hostfile: filename /root/.ssh/known_hosts
> > >debug3: check_host_in_hostfile: match line 5
> > >debug3: check_host_in_hostfile: filename /root/.ssh/known_hosts
> > >debug3: check_host_in_hostfile: match line 1
> > >debug1: Host 's5.inscomp.net' is known and matches the RSA host
> key.
> > >debug1: Found key in /root/.ssh/known_hosts:5
> > >debug2: bits set: 500/1024
> > >debug1: ssh_rsa_verify: signature correct
> > >debug2: kex_derive_keys
> > >debug2: set_newkeys: mode 1
> > >debug1: SSH2_MSG_NEWKEYS sent
> > >debug1: expecting SSH2_MSG_NEWKEYS
> > >debug2: set_newkeys: mode 0
> > >debug1: SSH2_MSG_NEWKEYS received
> > >debug1: SSH2_MSG_SERVICE_REQUEST sent
> > >debug2: service_accept: ssh-userauth
> > >debug1: SSH2_MSG_SERVICE_ACCEPT received
> > >debug2: key: /root/.ssh/identity ((nil))
> > >debug2: key: /root/.ssh/id_rsa ((nil))
> > >debug2: key: /root/.ssh/id_dsa ((nil))
> > >debug1: Authentications that can continue:
> > >publickey,gssapi-with-mic,password
> > >debug3: start over, passed a different list
> > >publickey,gssapi-with-mic,password
> > >debug3: preferred
> > >gssapi-with-mic,publickey,keyboard-interactive,password
> > >debug3: authmethod_lookup gssapi-with-mic
> > >debug3: remaining preferred:
> publickey,keyboard-interactive,password
> > >debug3: authmethod_is_enabled gssapi-with-mic
> > >debug1: Next authentication method: gssapi-with-mic
> > >debug3: Trying to reverse map address 66.121.54.249.
> > >debug2: we sent a gssapi-with-mic packet, wait for reply
> > >debug1: Authentications that can continue:
> > >publickey,gssapi-with-mic,password
> > >debug2: we sent a gssapi-with-mic packet, wait for reply
> > >debug1: Authentications that can continue:
> > >publickey,gssapi-with-mic,password
> > >debug2: we did not send a packet, disable method
> > >debug3: authmethod_lookup publickey
> > >debug3: remaining preferred: keyboard-interactive,password
> > >debug3: authmethod_is_enabled publickey
> > >debug1: Next authentication method: publickey
> > >debug1: Trying private key: /root/.ssh/identity
> > >debug3: no such identity: /root/.ssh/identity
> > >debug1: Trying private key: /root/.ssh/id_rsa
> > >debug3: no such identity: /root/.ssh/id_rsa
> > >debug1: Trying private key: /root/.ssh/id_dsa
> > >debug3: no such identity: /root/.ssh/id_dsa
> > >debug2: we did not send a packet, disable method
> > >debug3: authmethod_lookup password
> > >debug3: remaining preferred: ,password
> > >debug3: authmethod_is_enabled password
> > >debug1: Next authentication method: password
> > >admin at host.domain.tld's password:
> > >debug3: packet_send2: adding 48 (len 61 padlen 19 extra_pad 64)
> > >debug2: we sent a password packet, wait for reply
> > >debug1: Authentication succeeded (password).
> > >debug1: channel 0: new [client-session]
> > >debug3: ssh_session2_open: channel_new: 0
> > >debug2: channel 0: send open
> > >debug1: Entering interactive session.
> > >debug2: callback start
> > >debug2: client_session2_setup: id 0
> > >debug2: channel 0: request pty-req confirm 0
> > >debug3: tty_make_modes: ospeed 38400
> > >debug3: tty_make_modes: ispeed 38400
> > >debug3: tty_make_modes: 1 3
> > >debug3: tty_make_modes: 2 28
> > >debug3: tty_make_modes: 3 127
> > >debug3: tty_make_modes: 4 21
> > >debug3: tty_make_modes: 5 4
> > >debug3: tty_make_modes: 6 255
> > >debug3: tty_make_modes: 7 255
> > >debug3: tty_make_modes: 8 17
> > >debug3: tty_make_modes: 9 19
> > >debug3: tty_make_modes: 10 26
> > >debug3: tty_make_modes: 12 18
> > >debug3: tty_make_modes: 13 23
> > >debug3: tty_make_modes: 14 22
> > >debug3: tty_make_modes: 18 15
> > >debug3: tty_make_modes: 30 0
> > >debug3: tty_make_modes: 31 0
> > >debug3: tty_make_modes: 32 0
> > >debug3: tty_make_modes: 33 0
> > >debug3: tty_make_modes: 34 0
> > >debug3: tty_make_modes: 35 0
> > >debug3: tty_make_modes: 36 1
> > >debug3: tty_make_modes: 37 0
> > >debug3: tty_make_modes: 38 1
> > >debug3: tty_make_modes: 39 1
> > >debug3: tty_make_modes: 40 0
> > >debug3: tty_make_modes: 41 1
> > >debug3: tty_make_modes: 50 1
> > >debug3: tty_make_modes: 51 1
> > >debug3: tty_make_modes: 52 0
> > >debug3: tty_make_modes: 53 1
> > >debug3: tty_make_modes: 54 1
> > >debug3: tty_make_modes: 55 1
> > >debug3: tty_make_modes: 56 0
> > >debug3: tty_make_modes: 57 0
> > >debug3: tty_make_modes: 58 0
> > >debug3: tty_make_modes: 59 1
> > >debug3: tty_make_modes: 60 1
> > >debug3: tty_make_modes: 61 1
> > >debug3: tty_make_modes: 62 0
> > >debug3: tty_make_modes: 70 1
> > >debug3: tty_make_modes: 71 0
> > >debug3: tty_make_modes: 72 1
> > >debug3: tty_make_modes: 73 0
> > >debug3: tty_make_modes: 74 0
> > >debug3: tty_make_modes: 75 0
> > >debug3: tty_make_modes: 90 1
> > >debug3: tty_make_modes: 91 1
> > >debug3: tty_make_modes: 92 0
> > >debug3: tty_make_modes: 93 0
> > >debug2: channel 0: request shell confirm 0
> > >debug2: fd 3 setting TCP_NODELAY
> > >debug2: callback done
> > >debug2: channel 0: open confirm rwindow 0 rmax 32768
> > >debug2: channel 0: rcvd adjust 131072
> >
> > Hangs here!
> >
> > _______________________________________________
> > Blueonyx mailing list
> > Blueonyx at blueonyx.it
> > http://www.blueonyx.it/mailman/listinfo/blueonyx
> ------- End of Original Message -------
> _______________________________________________
> Blueonyx mailing list
> Blueonyx at blueonyx.it
> http://www.blueonyx.it/mailman/listinfo/blueonyx
More information about the Blueonyx
mailing list