Package: ssh Version: 1:3.8.1p1-8.sarge.4 Severity: important
sshd segfaults during connection attempts: % /usr/sbin/sshd -d -D -e debug1: sshd version OpenSSH_3.8.1p1 Debian-8.sarge.4 debug1: read PEM private key done: type RSA debug1: private host key: #0 type 1 RSA debug1: read PEM private key done: type DSA debug1: private host key: #1 type 2 DSA socket: Address family not supported by protocol debug1: Bind to port 22 on 0.0.0.0. Server listening on 0.0.0.0 port 22. debug1: Server will not fork when running in debugging mode. Connection from 10.223.13.37 port 55068 debug1: Client protocol version 2.0; client software version OpenSSH_3.8.1p1 Debian-8.sarge.4 debug1: match: OpenSSH_3.8.1p1 Debian-8.sarge.4 pat OpenSSH* debug1: Enabling compatibility mode for protocol 2.0 debug1: Local version string SSH-2.0-OpenSSH_3.8.1p1 Debian-8.sarge.4 debug1: permanently_set_uid: 100/65534 debug1: list_hostkey_types: ssh-rsa,ssh-dss debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: client->server aes128-cbc hmac-md5 none debug1: kex: server->client aes128-cbc hmac-md5 none debug1: SSH2_MSG_KEX_DH_GEX_REQUEST received debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT zsh: segmentation fault /usr/sbin/sshd -d -D -e % debug1: do_cleanup debug1: PAM: cleanup Here is the output from strace : http://www.lrde.epita.fr/~fouqui_g/strace.sshd On client side (debian unstable i386) : % ssh -v [EMAIL PROTECTED] OpenSSH_3.8.1p1 Debian-8.sarge.4, OpenSSL 0.9.7e 25 Oct 2004 debug1: Reading configuration data /home/djo/.ssh/config debug1: Reading configuration data /etc/ssh/ssh_config debug1: Connecting to 10.223.13.45 [10.223.13.45] port 22. debug1: Connection established. debug1: identity file /home/djo/.ssh/identity type 0 debug1: identity file /home/djo/.ssh/id_rsa type 1 debug1: identity file /home/djo/.ssh/id_dsa type 2 debug1: Remote protocol version 2.0, remote software version OpenSSH_3.8.1p1 Debian-8.sarge.4 debug1: match: OpenSSH_3.8.1p1 Debian-8.sarge.4 pat OpenSSH* debug1: Enabling compatibility mode for protocol 2.0 debug1: Local version string SSH-2.0-OpenSSH_3.8.1p1 Debian-8.sarge.4 debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: server->client aes128-cbc hmac-md5 none debug1: kex: client->server aes128-cbc hmac-md5 none debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP debug1: SSH2_MSG_KEX_DH_GEX_INIT sent debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY Connection closed by 10.223.13.45 ssh work well. -- System Information: Debian Release: 3.1 APT prefers testing APT policy: (500, 'testing') Architecture: sparc (sparc64) Kernel: Linux 2.4.26-sparc64 Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) Versions of packages ssh depends on: ii adduser 3.59 Add and remove users and groups ii debconf 1.4.30.10 Debian configuration management sy ii dpkg 1.10.25 Package maintenance system for Deb ii libc6 2.3.2.ds1-18 GNU C Library: Shared libraries an ii libpam-modules 0.76-22 Pluggable Authentication Modules f ii libpam-runtime 0.76-22 Runtime support for the PAM librar ii libpam0g 0.76-22 Pluggable Authentication Modules l ii libssl0.9.7 0.9.7e-2 SSL shared libraries ii libwrap0 7.6.dbs-6 Wietse Venema's TCP wrappers libra ii zlib1g 1:1.2.2-3 compression library - runtime -- debconf information: ssh/new_config: true * ssh/use_old_init_script: true * ssh/protocol2_only: true ssh/insecure_rshd: ssh/encrypted_host_key_but_no_keygen: ssh/ssh2_keys_merged: ssh/user_environment_tell: * ssh/run_sshd: true * ssh/forward_warning: * ssh/SUID_client: false ssh/insecure_telnetd: ssh/disable_cr_auth: false

