Re: CVS hangs on exit when using SSH
Larry - I've seen you saying 'this is fixed in the development version of cvs' a bunch recently. Perhaps we should think about rolling a new release? donald On Mon, Dec 02, 2002 at 01:34:19AM -0500, Larry Jones wrote: > Ken Williams writes: > > > > When I issue any CVS command (update, checkout, diff, etc.), the > > connection hangs indefinitely when the command is [nearly?] completed. > > It happens reliably on this client, but never happens on another client > > with identical software versions. > > There is a known incompatibility between the 1.11.2 server and all > previous clients when compression is enabled. This is fixed in the > current development version of CVS. > > -Larry Jones > > Yep, we'd probably be dead by now if it wasn't for Twinkies. -- Calvin > > > ___ > Info-cvs mailing list > [EMAIL PROTECTED] > http://mail.gnu.org/mailman/listinfo/info-cvs ___ Info-cvs mailing list [EMAIL PROTECTED] http://mail.gnu.org/mailman/listinfo/info-cvs
Re: CVS hangs on exit when using SSH
Ken Williams writes: > > When I issue any CVS command (update, checkout, diff, etc.), the > connection hangs indefinitely when the command is [nearly?] completed. > It happens reliably on this client, but never happens on another client > with identical software versions. There is a known incompatibility between the 1.11.2 server and all previous clients when compression is enabled. This is fixed in the current development version of CVS. -Larry Jones Yep, we'd probably be dead by now if it wasn't for Twinkies. -- Calvin ___ Info-cvs mailing list [EMAIL PROTECTED] http://mail.gnu.org/mailman/listinfo/info-cvs
Re: CVS hangs on exit when using SSH
On Monday, December 2, 2002, at 05:34 PM, Larry Jones wrote: Ken Williams writes: When I issue any CVS command (update, checkout, diff, etc.), the connection hangs indefinitely when the command is [nearly?] completed. It happens reliably on this client, but never happens on another client with identical software versions. There is a known incompatibility between the 1.11.2 server and all previous clients when compression is enabled. This is fixed in the current development version of CVS. Aha!! Thanks, the compression was the hidden difference between the two machines. I removed "-z 3" from my .cvsrc, and it started working properly. -Ken ___ Info-cvs mailing list [EMAIL PROTECTED] http://mail.gnu.org/mailman/listinfo/info-cvs
Re: CVS hangs on exit when using SSH
Just a guess, have you disabled the escape sequence in SSH? --- Ken Williams <[EMAIL PROTECTED]> wrote: > Hi, > > I've seen this problem several times in various CVS and SSH mailing > lists, but none of the threads I've found seem to end in a solution. > > I'm using CVS 1.10 `Halibut' as a client, connecting to CVS 1.11.2 on a > > server via SSH. Both the client and server are running OpenSSH_3.4p1, > SSH protocols 1.5/2.0, OpenSSL 0x0090605f. The client is a Mac OS X > 10.1.5 machine and the server is running Red Hat Linux release 8.0. > > When I issue any CVS command (update, checkout, diff, etc.), the > connection hangs indefinitely when the command is [nearly?] completed. > > It happens reliably on this client, but never happens on another client > > with identical software versions. > > When I set CVS_RSH to a shell script that does 'exec ssh -vvv "$@"', I > get the following output (I hit Ctrl-C after about 30 seconds): > > - > % cvs up > OpenSSH_3.4p1, SSH protocols 1.5/2.0, OpenSSL 0x0090605f > debug1: Reading configuration data /etc/ssh_config > debug1: Rhosts Authentication disabled, originating port will not be > trusted. > debug1: ssh_connect: needpriv 0 > debug1: Connecting to ebt.ee.usyd.edu.au [129.78.13.247] port 22. > debug1: Connection established. > debug1: identity file /Users/ken/.ssh/identity type 0 > debug3: Not a RSA1 key file /Users/ken/.ssh/id_rsa. > debug2: key_type_from_name: unknown key type '-BEGIN' > debug3: key_read: no key found > debug3: key_read: no space > debug3: key_read: no space > debug3: key_read: no space > debug3: key_read: no space > debug3: key_read: no space > debug3: key_read: no space > debug3: key_read: no space > debug3: key_read: no space > debug3: key_read: no space > debug3: key_read: no space > debug3: key_read: no space > debug3: key_read: no space > debug3: key_read: no space > debug2: key_type_from_name: unknown key type '-END' > debug3: key_read: no key found > debug1: identity file /Users/ken/.ssh/id_rsa type 1 > debug3: Not a RSA1 key file /Users/ken/.ssh/id_dsa. > debug2: key_type_from_name: unknown key type '-BEGIN' > debug3: key_read: no key found > debug3: key_read: no space > debug3: key_read: no space > debug3: key_read: no space > debug3: key_read: no space > debug3: key_read: no space > debug3: key_read: no space > debug3: key_read: no space > debug3: key_read: no space > debug3: key_read: no space > debug3: key_read: no space > debug2: key_type_from_name: unknown key type '-END' > debug3: key_read: no key found > debug1: identity file /Users/ken/.ssh/id_dsa type 2 > debug1: Remote protocol version 1.99, remote software version > OpenSSH_3.4p1 > debug1: match: OpenSSH_3.4p1 pat OpenSSH* > Enabling compatibility mode for protocol 2.0 > debug1: Local version string SSH-2.0-OpenSSH_3.4p1 > debug1: SSH2_MSG_KEXINIT sent > debug1: SSH2_MSG_KEXINIT received > debug2: kex_parse_kexinit: diffie-hellman-group-exchange- > sha1,diffie-hellman-group1-sha1 > debug2: kex_parse_kexinit: ssh-rsa,ssh-dss > debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish- > cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,[EMAIL PROTECTED] > debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish- > cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,[EMAIL PROTECTED] > debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac- > ripemd160,[EMAIL PROTECTED],hmac-sha1-96,hmac-md5-96 > debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac- > ripemd160,[EMAIL PROTECTED],hmac-sha1-96,hmac-md5-96 > debug2: kex_parse_kexinit: none > debug2: kex_parse_kexinit: none > debug2: kex_parse_kexinit: > debug2: kex_parse_kexinit: > debug2: kex_parse_kexinit: first_kex_follows 0 > debug2: kex_parse_kexinit: reserved 0 > debug2: kex_parse_kexinit: diffie-hellman-group-exchange- > sha1,diffie-hellman-group1-sha1 > debug2: kex_parse_kexinit: ssh-rsa,ssh-dss > debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish- > cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,[EMAIL PROTECTED] > debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish- > cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,[EMAIL PROTECTED] > debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac- > ripemd160,[EMAIL PROTECTED],hmac-sha1-96,hmac-md5-96 > debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac- > ripemd160,[EMAIL PROTECTED],hmac-sha1-96,hmac-md5-96 > debug2: kex_parse_kexinit: none,zlib > debug2: kex_parse_kexinit: none,zlib > debug2: kex_parse_kexinit: > debug2: kex_parse_kexinit: > debug2: kex_parse_kexinit: first_kex_follows 0 > debug2: kex_parse_kexinit: reserved 0 > debug2: mac_init: found hmac-md5 > debug1: kex: server->client aes128-cbc hmac-md5 none > debug2: mac_init: found hmac-md5 > debug1: kex: client->server aes128-cbc hmac-md5 none > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST sent > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP > debug1: dh_gen_key: priv key bits set: 135/256 > debug1: bits set: 1567/3191 > debug1: SSH2_MSG_KEX_D
Re: CVS hangs on exit when using SSH
Hi Wayne, I don't thing that's it. ssh only honors escape characters at a login session, not when executing remote commands. ssh(1) says: When the user's identity has been accepted by the server, the server either executes the given command, or logs into the machine and gives the user a normal shell on the remote machine. All communication with the remote command or shell will be automatically encrypted. If a pseudo-terminal has been allocated (normal login session), the user may use the escape characters noted below. If no pseudo tty has been allocated, the session is transparent and can be used to reliably transfer binary data. I've used ssh and cvs in this configuration to transfer arbitrary binary data before. -Ken On Monday, December 2, 2002, at 12:46 PM, Wayne Johnson wrote: Just a guess, have you disabled the escape sequence in SSH? --- Ken Williams <[EMAIL PROTECTED]> wrote: Hi, I've seen this problem several times in various CVS and SSH mailing lists, but none of the threads I've found seem to end in a solution. I'm using CVS 1.10 `Halibut' as a client, connecting to CVS 1.11.2 on a server via SSH. Both the client and server are running OpenSSH_3.4p1, SSH protocols 1.5/2.0, OpenSSL 0x0090605f. The client is a Mac OS X 10.1.5 machine and the server is running Red Hat Linux release 8.0. When I issue any CVS command (update, checkout, diff, etc.), the connection hangs indefinitely when the command is [nearly?] completed. It happens reliably on this client, but never happens on another client with identical software versions. When I set CVS_RSH to a shell script that does 'exec ssh -vvv "$@"', I get the following output (I hit Ctrl-C after about 30 seconds): ___ Info-cvs mailing list [EMAIL PROTECTED] http://mail.gnu.org/mailman/listinfo/info-cvs
CVS hangs on exit when using SSH
Hi, I've seen this problem several times in various CVS and SSH mailing lists, but none of the threads I've found seem to end in a solution. I'm using CVS 1.10 `Halibut' as a client, connecting to CVS 1.11.2 on a server via SSH. Both the client and server are running OpenSSH_3.4p1, SSH protocols 1.5/2.0, OpenSSL 0x0090605f. The client is a Mac OS X 10.1.5 machine and the server is running Red Hat Linux release 8.0. When I issue any CVS command (update, checkout, diff, etc.), the connection hangs indefinitely when the command is [nearly?] completed. It happens reliably on this client, but never happens on another client with identical software versions. When I set CVS_RSH to a shell script that does 'exec ssh -vvv "$@"', I get the following output (I hit Ctrl-C after about 30 seconds): - % cvs up OpenSSH_3.4p1, SSH protocols 1.5/2.0, OpenSSL 0x0090605f debug1: Reading configuration data /etc/ssh_config debug1: Rhosts Authentication disabled, originating port will not be trusted. debug1: ssh_connect: needpriv 0 debug1: Connecting to ebt.ee.usyd.edu.au [129.78.13.247] port 22. debug1: Connection established. debug1: identity file /Users/ken/.ssh/identity type 0 debug3: Not a RSA1 key file /Users/ken/.ssh/id_rsa. debug2: key_type_from_name: unknown key type '-BEGIN' debug3: key_read: no key found debug3: key_read: no space debug3: key_read: no space debug3: key_read: no space debug3: key_read: no space debug3: key_read: no space debug3: key_read: no space debug3: key_read: no space debug3: key_read: no space debug3: key_read: no space debug3: key_read: no space debug3: key_read: no space debug3: key_read: no space debug3: key_read: no space debug2: key_type_from_name: unknown key type '-END' debug3: key_read: no key found debug1: identity file /Users/ken/.ssh/id_rsa type 1 debug3: Not a RSA1 key file /Users/ken/.ssh/id_dsa. debug2: key_type_from_name: unknown key type '-BEGIN' debug3: key_read: no key found debug3: key_read: no space debug3: key_read: no space debug3: key_read: no space debug3: key_read: no space debug3: key_read: no space debug3: key_read: no space debug3: key_read: no space debug3: key_read: no space debug3: key_read: no space debug3: key_read: no space debug2: key_type_from_name: unknown key type '-END' debug3: key_read: no key found debug1: identity file /Users/ken/.ssh/id_dsa type 2 debug1: Remote protocol version 1.99, remote software version OpenSSH_3.4p1 debug1: match: OpenSSH_3.4p1 pat OpenSSH* Enabling compatibility mode for protocol 2.0 debug1: Local version string SSH-2.0-OpenSSH_3.4p1 debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug2: kex_parse_kexinit: diffie-hellman-group-exchange- sha1,diffie-hellman-group1-sha1 debug2: kex_parse_kexinit: ssh-rsa,ssh-dss debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish- cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,[EMAIL PROTECTED] debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish- cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,[EMAIL PROTECTED] debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac- ripemd160,[EMAIL PROTECTED],hmac-sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac- ripemd160,[EMAIL PROTECTED],hmac-sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: none debug2: kex_parse_kexinit: none debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: first_kex_follows 0 debug2: kex_parse_kexinit: reserved 0 debug2: kex_parse_kexinit: diffie-hellman-group-exchange- sha1,diffie-hellman-group1-sha1 debug2: kex_parse_kexinit: ssh-rsa,ssh-dss debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish- cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,[EMAIL PROTECTED] debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish- cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,[EMAIL PROTECTED] debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac- ripemd160,[EMAIL PROTECTED],hmac-sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac- ripemd160,[EMAIL PROTECTED],hmac-sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: none,zlib debug2: kex_parse_kexinit: none,zlib debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: first_kex_follows 0 debug2: kex_parse_kexinit: reserved 0 debug2: mac_init: found hmac-md5 debug1: kex: server->client aes128-cbc hmac-md5 none debug2: mac_init: found hmac-md5 debug1: kex: client->server aes128-cbc hmac-md5 none debug1: SSH2_MSG_KEX_DH_GEX_REQUEST sent debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP debug1: dh_gen_key: priv key bits set: 135/256 debug1: bits set: 1567/3191 debug1: SSH2_MSG_KEX_DH_GEX_INIT sent debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY debug3: check_host_in_hostfile: filename /Users/ken/.ssh/known_hosts2 debug3: check_host_in_hostfile: filename /etc/ssh_known_hosts2 debug3: check_host_in_hostfile: filename /Users/ken/.ssh/known_hosts2 debug3: check_host_in_hostfile: filename /etc/ssh_known_hosts2 debug3: che