[BlueOnyx:03606] ssh hangs after password

Gerald Waugh gwaugh at raqware.com
Wed Feb 17 11:15:38 -05 2010


Excuse the cross post, looking for an answer.
ssh into the server, enter password, and hangs.
Tried with putty and a Linux PC terminal session,

Can't even ^C out, have to close the terminal session.
here is a debug output of the connection.


>[root at s3 ~]# ssh -vvv -p20200 admin at s5.inscomp.net
>OpenSSH_3.9p1, OpenSSL 0.9.7a Feb 19 2003
>debug1: Reading configuration data /etc/ssh/ssh_config
>debug1: Applying options for *
>debug2: ssh_connect: needpriv 0
>debug1: Connecting to s5.inscomp.net [66.121.54.249] port 20200.
>debug1: Connection established.
>debug1: permanently_set_uid: 0/0
>debug1: identity file /root/.ssh/identity type -1
>debug1: identity file /root/.ssh/id_rsa type -1
>debug1: identity file /root/.ssh/id_dsa type -1
>debug1: Remote protocol version 2.0, remote software version
>OpenSSH_3.9p1
>debug1: match: OpenSSH_3.9p1 pat OpenSSH*
>debug1: Enabling compatibility mode for protocol 2.0
>debug1: Local version string SSH-2.0-OpenSSH_3.9p1
>debug2: fd 3 setting O_NONBLOCK
>debug1: SSH2_MSG_KEXINIT sent
>debug1: SSH2_MSG_KEXINIT received
>debug2: kex_parse_kexinit:
>diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
>debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
>debug2: kex_parse_kexinit:
>aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc at lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
>debug2: kex_parse_kexinit:
>aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc at lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
>debug2: kex_parse_kexinit:
>hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
>debug2: kex_parse_kexinit:
>hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
>debug2: kex_parse_kexinit: none,zlib
>debug2: kex_parse_kexinit: none,zlib
>debug2: kex_parse_kexinit:
>debug2: kex_parse_kexinit:
>debug2: kex_parse_kexinit: first_kex_follows 0
>debug2: kex_parse_kexinit: reserved 0
>debug2: kex_parse_kexinit:
>diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
>debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
>debug2: kex_parse_kexinit:
>aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc at lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
>debug2: kex_parse_kexinit:
>aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc at lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
>debug2: kex_parse_kexinit:
>hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
>debug2: kex_parse_kexinit:
>hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
>debug2: kex_parse_kexinit: none,zlib
>debug2: kex_parse_kexinit: none,zlib
>debug2: kex_parse_kexinit:
>debug2: kex_parse_kexinit:
>debug2: kex_parse_kexinit: first_kex_follows 0
>debug2: kex_parse_kexinit: reserved 0
>debug2: mac_init: found hmac-md5
>debug1: kex: server->client aes128-cbc hmac-md5 none
>debug2: mac_init: found hmac-md5
>debug1: kex: client->server aes128-cbc hmac-md5 none
>debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent
>debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
>debug2: dh_gen_key: priv key bits set: 124/256
>debug2: bits set: 513/1024
>debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
>debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
>debug3: check_host_in_hostfile: filename /root/.ssh/known_hosts
>debug3: check_host_in_hostfile: match line 5
>debug3: check_host_in_hostfile: filename /root/.ssh/known_hosts
>debug3: check_host_in_hostfile: match line 1
>debug1: Host 's5.inscomp.net' is known and matches the RSA host key.
>debug1: Found key in /root/.ssh/known_hosts:5
>debug2: bits set: 500/1024
>debug1: ssh_rsa_verify: signature correct
>debug2: kex_derive_keys
>debug2: set_newkeys: mode 1
>debug1: SSH2_MSG_NEWKEYS sent
>debug1: expecting SSH2_MSG_NEWKEYS
>debug2: set_newkeys: mode 0
>debug1: SSH2_MSG_NEWKEYS received
>debug1: SSH2_MSG_SERVICE_REQUEST sent
>debug2: service_accept: ssh-userauth
>debug1: SSH2_MSG_SERVICE_ACCEPT received
>debug2: key: /root/.ssh/identity ((nil))
>debug2: key: /root/.ssh/id_rsa ((nil))
>debug2: key: /root/.ssh/id_dsa ((nil))
>debug1: Authentications that can continue:
>publickey,gssapi-with-mic,password
>debug3: start over, passed a different list
>publickey,gssapi-with-mic,password
>debug3: preferred
>gssapi-with-mic,publickey,keyboard-interactive,password
>debug3: authmethod_lookup gssapi-with-mic
>debug3: remaining preferred: publickey,keyboard-interactive,password
>debug3: authmethod_is_enabled gssapi-with-mic
>debug1: Next authentication method: gssapi-with-mic
>debug3: Trying to reverse map address 66.121.54.249.
>debug2: we sent a gssapi-with-mic packet, wait for reply
>debug1: Authentications that can continue:
>publickey,gssapi-with-mic,password
>debug2: we sent a gssapi-with-mic packet, wait for reply
>debug1: Authentications that can continue:
>publickey,gssapi-with-mic,password
>debug2: we did not send a packet, disable method
>debug3: authmethod_lookup publickey
>debug3: remaining preferred: keyboard-interactive,password
>debug3: authmethod_is_enabled publickey
>debug1: Next authentication method: publickey
>debug1: Trying private key: /root/.ssh/identity
>debug3: no such identity: /root/.ssh/identity
>debug1: Trying private key: /root/.ssh/id_rsa
>debug3: no such identity: /root/.ssh/id_rsa
>debug1: Trying private key: /root/.ssh/id_dsa
>debug3: no such identity: /root/.ssh/id_dsa
>debug2: we did not send a packet, disable method
>debug3: authmethod_lookup password
>debug3: remaining preferred: ,password
>debug3: authmethod_is_enabled password
>debug1: Next authentication method: password
>admin at host.domain.tld's password:
>debug3: packet_send2: adding 48 (len 61 padlen 19 extra_pad 64)
>debug2: we sent a password packet, wait for reply
>debug1: Authentication succeeded (password).
>debug1: channel 0: new [client-session]
>debug3: ssh_session2_open: channel_new: 0
>debug2: channel 0: send open
>debug1: Entering interactive session.
>debug2: callback start
>debug2: client_session2_setup: id 0
>debug2: channel 0: request pty-req confirm 0
>debug3: tty_make_modes: ospeed 38400
>debug3: tty_make_modes: ispeed 38400
>debug3: tty_make_modes: 1 3
>debug3: tty_make_modes: 2 28
>debug3: tty_make_modes: 3 127
>debug3: tty_make_modes: 4 21
>debug3: tty_make_modes: 5 4
>debug3: tty_make_modes: 6 255
>debug3: tty_make_modes: 7 255
>debug3: tty_make_modes: 8 17
>debug3: tty_make_modes: 9 19
>debug3: tty_make_modes: 10 26
>debug3: tty_make_modes: 12 18
>debug3: tty_make_modes: 13 23
>debug3: tty_make_modes: 14 22
>debug3: tty_make_modes: 18 15
>debug3: tty_make_modes: 30 0
>debug3: tty_make_modes: 31 0
>debug3: tty_make_modes: 32 0
>debug3: tty_make_modes: 33 0
>debug3: tty_make_modes: 34 0
>debug3: tty_make_modes: 35 0
>debug3: tty_make_modes: 36 1
>debug3: tty_make_modes: 37 0
>debug3: tty_make_modes: 38 1
>debug3: tty_make_modes: 39 1
>debug3: tty_make_modes: 40 0
>debug3: tty_make_modes: 41 1
>debug3: tty_make_modes: 50 1
>debug3: tty_make_modes: 51 1
>debug3: tty_make_modes: 52 0
>debug3: tty_make_modes: 53 1
>debug3: tty_make_modes: 54 1
>debug3: tty_make_modes: 55 1
>debug3: tty_make_modes: 56 0
>debug3: tty_make_modes: 57 0
>debug3: tty_make_modes: 58 0
>debug3: tty_make_modes: 59 1
>debug3: tty_make_modes: 60 1
>debug3: tty_make_modes: 61 1
>debug3: tty_make_modes: 62 0
>debug3: tty_make_modes: 70 1
>debug3: tty_make_modes: 71 0
>debug3: tty_make_modes: 72 1
>debug3: tty_make_modes: 73 0
>debug3: tty_make_modes: 74 0
>debug3: tty_make_modes: 75 0
>debug3: tty_make_modes: 90 1
>debug3: tty_make_modes: 91 1
>debug3: tty_make_modes: 92 0
>debug3: tty_make_modes: 93 0
>debug2: channel 0: request shell confirm 0
>debug2: fd 3 setting TCP_NODELAY
>debug2: callback done
>debug2: channel 0: open confirm rwindow 0 rmax 32768
>debug2: channel 0: rcvd adjust 131072

Hangs here!





More information about the Blueonyx mailing list