[BlueOnyx:03607] Re: ssh hangs after password

Chuck Tetlow chuck at tetlow.net
Wed Feb 17 12:42:08 -05 2010


Have you tried waiting a while?  It may be a reverse DNS lookup is failing (trying to get a name to log the connection).  In which case, it will respond and let you in when it finally times out.  I believe the default timeout is 45 seconds.  But I've seen some hang as long as two/three minutes.

Chuck

---------- Original Message -----------
From: Gerald Waugh <gwaugh at raqware.com> 
To: coba-e <coba-e at bluequartz.org>, BlueOnyx General Mailing List <blueonyx at blueonyx.it> 
Sent: Wed, 17 Feb 2010 11:15:38 -0500 
Subject: [BlueOnyx:03606]  ssh hangs after password

> Excuse the cross post, looking for an answer. 
> ssh into the server, enter password, and hangs. 
> Tried with putty and a Linux PC terminal session, 
> 
> Can't even ^C out, have to close the terminal session. 
> here is a debug output of the connection. 
> 
> >[root at s3 ~]# ssh -vvv -p20200 admin at s5.inscomp.net 
> >OpenSSH_3.9p1, OpenSSL 0.9.7a Feb 19 2003 
> >debug1: Reading configuration data /etc/ssh/ssh_config 
> >debug1: Applying options for * 
> >debug2: ssh_connect: needpriv 0 
> >debug1: Connecting to s5.inscomp.net [66.121.54.249] port 20200. 
> >debug1: Connection established. 
> >debug1: permanently_set_uid: 0/0 
> >debug1: identity file /root/.ssh/identity type -1 
> >debug1: identity file /root/.ssh/id_rsa type -1 
> >debug1: identity file /root/.ssh/id_dsa type -1 
> >debug1: Remote protocol version 2.0, remote software version 
> >OpenSSH_3.9p1 
> >debug1: match: OpenSSH_3.9p1 pat OpenSSH* 
> >debug1: Enabling compatibility mode for protocol 2.0 
> >debug1: Local version string SSH-2.0-OpenSSH_3.9p1 
> >debug2: fd 3 setting O_NONBLOCK 
> >debug1: SSH2_MSG_KEXINIT sent 
> >debug1: SSH2_MSG_KEXINIT received 
> >debug2: kex_parse_kexinit: 
> >diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 
> >debug2: kex_parse_kexinit: ssh-rsa,ssh-dss 
> >debug2: kex_parse_kexinit: 
> >aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc at lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr 
> >debug2: kex_parse_kexinit: 
> >aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc at lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr 
> >debug2: kex_parse_kexinit: 
> >hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96 
> >debug2: kex_parse_kexinit: 
> >hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96 
> >debug2: kex_parse_kexinit: none,zlib 
> >debug2: kex_parse_kexinit: none,zlib 
> >debug2: kex_parse_kexinit: 
> >debug2: kex_parse_kexinit: 
> >debug2: kex_parse_kexinit: first_kex_follows 0 
> >debug2: kex_parse_kexinit: reserved 0 
> >debug2: kex_parse_kexinit: 
> >diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 
> >debug2: kex_parse_kexinit: ssh-rsa,ssh-dss 
> >debug2: kex_parse_kexinit: 
> >aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc at lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr 
> >debug2: kex_parse_kexinit: 
> >aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc at lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr 
> >debug2: kex_parse_kexinit: 
> >hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96 
> >debug2: kex_parse_kexinit: 
> >hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96 
> >debug2: kex_parse_kexinit: none,zlib 
> >debug2: kex_parse_kexinit: none,zlib 
> >debug2: kex_parse_kexinit: 
> >debug2: kex_parse_kexinit: 
> >debug2: kex_parse_kexinit: first_kex_follows 0 
> >debug2: kex_parse_kexinit: reserved 0 
> >debug2: mac_init: found hmac-md5 
> >debug1: kex: server->client aes128-cbc hmac-md5 none 
> >debug2: mac_init: found hmac-md5 
> >debug1: kex: client->server aes128-cbc hmac-md5 none 
> >debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent 
> >debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP 
> >debug2: dh_gen_key: priv key bits set: 124/256 
> >debug2: bits set: 513/1024 
> >debug1: SSH2_MSG_KEX_DH_GEX_INIT sent 
> >debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY 
> >debug3: check_host_in_hostfile: filename /root/.ssh/known_hosts 
> >debug3: check_host_in_hostfile: match line 5 
> >debug3: check_host_in_hostfile: filename /root/.ssh/known_hosts 
> >debug3: check_host_in_hostfile: match line 1 
> >debug1: Host 's5.inscomp.net' is known and matches the RSA host key. 
> >debug1: Found key in /root/.ssh/known_hosts:5 
> >debug2: bits set: 500/1024 
> >debug1: ssh_rsa_verify: signature correct 
> >debug2: kex_derive_keys 
> >debug2: set_newkeys: mode 1 
> >debug1: SSH2_MSG_NEWKEYS sent 
> >debug1: expecting SSH2_MSG_NEWKEYS 
> >debug2: set_newkeys: mode 0 
> >debug1: SSH2_MSG_NEWKEYS received 
> >debug1: SSH2_MSG_SERVICE_REQUEST sent 
> >debug2: service_accept: ssh-userauth 
> >debug1: SSH2_MSG_SERVICE_ACCEPT received 
> >debug2: key: /root/.ssh/identity ((nil)) 
> >debug2: key: /root/.ssh/id_rsa ((nil)) 
> >debug2: key: /root/.ssh/id_dsa ((nil)) 
> >debug1: Authentications that can continue: 
> >publickey,gssapi-with-mic,password 
> >debug3: start over, passed a different list 
> >publickey,gssapi-with-mic,password 
> >debug3: preferred 
> >gssapi-with-mic,publickey,keyboard-interactive,password 
> >debug3: authmethod_lookup gssapi-with-mic 
> >debug3: remaining preferred: publickey,keyboard-interactive,password 
> >debug3: authmethod_is_enabled gssapi-with-mic 
> >debug1: Next authentication method: gssapi-with-mic 
> >debug3: Trying to reverse map address 66.121.54.249. 
> >debug2: we sent a gssapi-with-mic packet, wait for reply 
> >debug1: Authentications that can continue: 
> >publickey,gssapi-with-mic,password 
> >debug2: we sent a gssapi-with-mic packet, wait for reply 
> >debug1: Authentications that can continue: 
> >publickey,gssapi-with-mic,password 
> >debug2: we did not send a packet, disable method 
> >debug3: authmethod_lookup publickey 
> >debug3: remaining preferred: keyboard-interactive,password 
> >debug3: authmethod_is_enabled publickey 
> >debug1: Next authentication method: publickey 
> >debug1: Trying private key: /root/.ssh/identity 
> >debug3: no such identity: /root/.ssh/identity 
> >debug1: Trying private key: /root/.ssh/id_rsa 
> >debug3: no such identity: /root/.ssh/id_rsa 
> >debug1: Trying private key: /root/.ssh/id_dsa 
> >debug3: no such identity: /root/.ssh/id_dsa 
> >debug2: we did not send a packet, disable method 
> >debug3: authmethod_lookup password 
> >debug3: remaining preferred: ,password 
> >debug3: authmethod_is_enabled password 
> >debug1: Next authentication method: password 
> >admin at host.domain.tld's password: 
> >debug3: packet_send2: adding 48 (len 61 padlen 19 extra_pad 64) 
> >debug2: we sent a password packet, wait for reply 
> >debug1: Authentication succeeded (password). 
> >debug1: channel 0: new [client-session] 
> >debug3: ssh_session2_open: channel_new: 0 
> >debug2: channel 0: send open 
> >debug1: Entering interactive session. 
> >debug2: callback start 
> >debug2: client_session2_setup: id 0 
> >debug2: channel 0: request pty-req confirm 0 
> >debug3: tty_make_modes: ospeed 38400 
> >debug3: tty_make_modes: ispeed 38400 
> >debug3: tty_make_modes: 1 3 
> >debug3: tty_make_modes: 2 28 
> >debug3: tty_make_modes: 3 127 
> >debug3: tty_make_modes: 4 21 
> >debug3: tty_make_modes: 5 4 
> >debug3: tty_make_modes: 6 255 
> >debug3: tty_make_modes: 7 255 
> >debug3: tty_make_modes: 8 17 
> >debug3: tty_make_modes: 9 19 
> >debug3: tty_make_modes: 10 26 
> >debug3: tty_make_modes: 12 18 
> >debug3: tty_make_modes: 13 23 
> >debug3: tty_make_modes: 14 22 
> >debug3: tty_make_modes: 18 15 
> >debug3: tty_make_modes: 30 0 
> >debug3: tty_make_modes: 31 0 
> >debug3: tty_make_modes: 32 0 
> >debug3: tty_make_modes: 33 0 
> >debug3: tty_make_modes: 34 0 
> >debug3: tty_make_modes: 35 0 
> >debug3: tty_make_modes: 36 1 
> >debug3: tty_make_modes: 37 0 
> >debug3: tty_make_modes: 38 1 
> >debug3: tty_make_modes: 39 1 
> >debug3: tty_make_modes: 40 0 
> >debug3: tty_make_modes: 41 1 
> >debug3: tty_make_modes: 50 1 
> >debug3: tty_make_modes: 51 1 
> >debug3: tty_make_modes: 52 0 
> >debug3: tty_make_modes: 53 1 
> >debug3: tty_make_modes: 54 1 
> >debug3: tty_make_modes: 55 1 
> >debug3: tty_make_modes: 56 0 
> >debug3: tty_make_modes: 57 0 
> >debug3: tty_make_modes: 58 0 
> >debug3: tty_make_modes: 59 1 
> >debug3: tty_make_modes: 60 1 
> >debug3: tty_make_modes: 61 1 
> >debug3: tty_make_modes: 62 0 
> >debug3: tty_make_modes: 70 1 
> >debug3: tty_make_modes: 71 0 
> >debug3: tty_make_modes: 72 1 
> >debug3: tty_make_modes: 73 0 
> >debug3: tty_make_modes: 74 0 
> >debug3: tty_make_modes: 75 0 
> >debug3: tty_make_modes: 90 1 
> >debug3: tty_make_modes: 91 1 
> >debug3: tty_make_modes: 92 0 
> >debug3: tty_make_modes: 93 0 
> >debug2: channel 0: request shell confirm 0 
> >debug2: fd 3 setting TCP_NODELAY 
> >debug2: callback done 
> >debug2: channel 0: open confirm rwindow 0 rmax 32768 
> >debug2: channel 0: rcvd adjust 131072 
> 
> Hangs here! 
> 
> _______________________________________________ 
> Blueonyx mailing list 
> Blueonyx at blueonyx.it 
> http://www.blueonyx.it/mailman/listinfo/blueonyx 
------- End of Original Message -------
 
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.blueonyx.it/pipermail/blueonyx/attachments/20100217/8e9b76b2/attachment.html>


More information about the Blueonyx mailing list