Package: x2goclient
Version: 4.1.2.2

Hello, devs!

I'm afraid this is not a very precise bug report.  Any assistance in
how to investigate this is appreciated.

We're running x2goclient 4.1.2.2 on Windows-10 machines, this has served
us well up to now.  With our new RedHat Enterprise Server 8.4 in production,
we see the client crashing very often.

When the client crashes, it does so shortly after trying to log in to a
new or existing session.  The clients "show details" window pane is activated, 
but the client dies before anything can be seen there.

On the server, just these entries in the system logs appears:

Aug 05 14:42:56 mimi.uio.no sshd[2421324]: Connection from 
2001:700:100:4028:9462:e3c7:21c5:ec1c port 49763 on 2001:700:100:118::101 port 
22
Aug 05 14:42:59 mimi.uio.no sshd[2421324]: Connection reset by 
2001:700:100:4028:9462:e3c7:21c5:ec1c port 49763 [preauth]

If I disable IPv6:

Aug 05 14:45:30 mimi.uio.no sshd[2421601]: Connection from 193.157.161.44 port 
57619 on 129.240.118.101 port 22
Aug 05 14:45:33 mimi.uio.no sshd[2421601]: Connection reset by 193.157.161.44 
port 57619 [preauth]

Note the absence of the "Fail password for ..." log entry.  It looks like
it never gets to even try authenticating.

There is no problem logging in with putty from the same client machine,
both with IPv6 and IPv4.  Neither have I had this problem (at least
not so frequent) with the Linux client.

The server is running sshd and x2goserver from the RHEL8/EPEL repos,
packages openssh-server-8.0p1-6 and x2goserver-4.1.0.3-9, respectively.

I eventually tried to run sshd -ddd on the server and catch the output.  
The typescripts are attached (slightly edited): one where the client crashed;
and one where it didn't (but couldn't authenticate, bad password).  I'm no
expert on ssh, but it seems like the difference appears after the key exchange
("KEX done"), when the instance that crashed never reaches the bit with 
userauth-request.

I also tried "setenforce 0" on the server, i.e. disable SELinux, but the
client still crashed.

As it is, I can't clearly provide a procedure to reproduce the problem,
as it doesn't always happen. 

If more information is required, or there are suggested steps to take,
please let me know.


Thanks in advance, and best regards,
-- 
Hans Peter Verne  --  IT-drift Geofag.

In 1934, Van der Lubbe was beheaded in a German prison yard. In 1967, a court
in West Berlin overturned the 1933 verdict, and posthumously changed Van der
Lubbe's sentence to eight years in prison.  -- "Reichstag fire" on Wikipedia.
Script started on 2021-08-05 15:36:21+02:00
[root@mimi ~]# /usr/sbin/sshd -ddd -p 443
debug2: load_server_config: filename /etc/ssh/sshd_config
debug2: load_server_config: done config len = 1247
debug2: parse_server_config: config /etc/ssh/sshd_config len 1247
debug3: /etc/ssh/sshd_config:25 setting Protocol 2
debug2: /etc/ssh/sshd_config line 25: Deprecated option Protocol
debug3: /etc/ssh/sshd_config:29 setting HostKey /etc/ssh/ssh_host_ecdsa_key
debug3: /etc/ssh/sshd_config:30 setting HostKey /etc/ssh/ssh_host_rsa_key
debug3: /etc/ssh/sshd_config:38 setting SyslogFacility AUTH
debug3: /etc/ssh/sshd_config:40 setting LogLevel VERBOSE
debug3: /etc/ssh/sshd_config:69 setting PasswordAuthentication yes
debug3: /etc/ssh/sshd_config:73 setting ChallengeResponseAuthentication no
debug3: /etc/ssh/sshd_config:99 setting UsePAM yes
debug3: /etc/ssh/sshd_config:102 setting AcceptEnv LANG LC_CTYPE LC_NUMERIC 
LC_TIME LC_COLLATE LC_MONETARY LC_MESSAGES
debug3: /etc/ssh/sshd_config:103 setting AcceptEnv LC_PAPER LC_NAME LC_ADDRESS 
LC_TELEPHONE LC_MEASUREMENT
debug3: /etc/ssh/sshd_config:104 setting AcceptEnv LC_IDENTIFICATION LC_ALL 
LANGUAGE
debug3: /etc/ssh/sshd_config:105 setting AcceptEnv XMODIFIERS
debug3: /etc/ssh/sshd_config:106 setting AcceptEnv SUDO_USER
debug3: /etc/ssh/sshd_config:112 setting X11Forwarding yes
debug3: /etc/ssh/sshd_config:124 setting UseDNS yes
debug3: /etc/ssh/sshd_config:134 setting Subsystem sftp 
/usr/libexec/openssh/sftp-server
debug3: /etc/ssh/sshd_config:146 setting PermitRootLogin no
debug3: checking syntax for 'Match Address 127.0.0.0/8'
debug3: checking syntax for 'Match Address ::1/128'
debug3: checking syntax for 'Match Address 129.240.0.0/16'
debug3: checking syntax for 'Match Address 158.36.5.0/24'
debug3: checking syntax for 'Match Address 193.157.128.0/17'
debug3: checking syntax for 'Match Address 2001:700:100::/40'
debug3: checking syntax for 'Match Address 2001:700:5800:10::/64'
debug3: checking syntax for 'Match Address fe80::/10'
debug3: checking syntax for 'Match Address 10.0.0.0/8'
debug3: checking syntax for 'Match Address 172.16.0.0/12'
debug3: checking syntax for 'Match Address 192.168.0.0/16'
debug3: checking syntax for 'Match User oracle'
debug1: sshd version OpenSSH_8.0, OpenSSL 1.1.1g FIPS  21 Apr 2020
debug1: private host key #0: ecdsa-sha2-nistp256 SHA256:(removed)
debug1: private host key #1: ssh-rsa SHA256:(removed)
debug1: rexec_argv[0]='/usr/sbin/sshd'
debug1: rexec_argv[1]='-ddd'
debug1: rexec_argv[2]='-p'
debug1: rexec_argv[3]='443'
debug3: oom_adjust_setup
debug1: Set /proc/self/oom_score_adj from 0 to -1000
debug2: fd 3 setting O_NONBLOCK
debug1: Bind to port 443 on 0.0.0.0.
Server listening on 0.0.0.0 port 443.
debug2: fd 4 setting O_NONBLOCK
debug3: sock_set_v6only: set socket 4 IPV6_V6ONLY
debug1: Bind to port 443 on ::.
Server listening on :: port 443.

debug3: fd 5 is not O_NONBLOCK
debug1: Server will not fork when running in debugging mode.
debug3: send_rexec_state: entering fd = 8 config len 1247
debug3: ssh_msg_send: type 0
debug3: send_rexec_state: done
debug1: rexec start in 5 out 5 newsock 5 pipe -1 sock 8
debug1: inetd sockets after dupping: 3, 3
Connection from 2001:700:100:4029:a83d:8cee:2dcf:d70e port 60020 on 
2001:700:100:118::101 port 443
debug1: Local version string SSH-2.0-OpenSSH_8.0
debug1: Remote protocol version 2.0, remote software version libssh_0.9.3
debug1: no match: libssh_0.9.3
debug2: fd 3 setting O_NONBLOCK
debug3: ssh_sandbox_init: preparing seccomp filter sandbox
debug2: Network child is on pid 2434686
debug3: preauth child monitor started
debug1: SELinux support enabled [preauth]
debug1: ssh_selinux_change_context: setting context from 
'unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023' to 
'unconfined_u:unconfined_r:sshd_net_t:s0-s0:c0.c1023' [preauth]
debug3: ssh_selinux_change_context: setcon 
unconfined_u:unconfined_r:sshd_net_t:s0-s0:c0.c1023 from 
unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 failed with Invalid 
argument [preauth]
debug3: privsep user:group 74:74 [preauth]
debug1: permanently_set_uid: 74/74 [preauth]
debug3: ssh_sandbox_child: setting PR_SET_NO_NEW_PRIVS [preauth]
debug3: ssh_sandbox_child: attaching seccomp filter program [preauth]
debug1: list_hostkey_types: 
ecdsa-sha2-nistp256,rsa-sha2-512,rsa-sha2-256,ssh-rsa [preauth]
debug3: send packet: type 20 [preauth]
debug1: SSH2_MSG_KEXINIT sent [preauth]
debug3: receive packet: type 20 [preauth]
debug1: SSH2_MSG_KEXINIT received [preauth]
debug2: local server KEXINIT proposal [preauth]
debug2: KEX algorithms: 
curve25519-sha256,curve25519-sha...@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1
 [preauth]
debug2: host key algorithms: 
ecdsa-sha2-nistp256,rsa-sha2-512,rsa-sha2-256,ssh-rsa [preauth]
debug2: ciphers ctos: 
chacha20-poly1...@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-...@openssh.com,aes256-...@openssh.com
 [preauth]
debug2: ciphers stoc: 
chacha20-poly1...@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-...@openssh.com,aes256-...@openssh.com
 [preauth]
debug2: MACs ctos: 
umac-64-...@openssh.com,umac-128-...@openssh.com,hmac-sha2-256-...@openssh.com,hmac-sha2-512-...@openssh.com,hmac-sha1-...@openssh.com,umac...@openssh.com,umac-...@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
 [preauth]
debug2: MACs stoc: 
umac-64-...@openssh.com,umac-128-...@openssh.com,hmac-sha2-256-...@openssh.com,hmac-sha2-512-...@openssh.com,hmac-sha1-...@openssh.com,umac...@openssh.com,umac-...@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
 [preauth]
debug2: compression ctos: none,z...@openssh.com [preauth]
debug2: compression stoc: none,z...@openssh.com [preauth]
debug2: languages ctos:  [preauth]
debug2: languages stoc:  [preauth]
debug2: first_kex_follows 0  [preauth]
debug2: reserved 0  [preauth]
debug2: peer client KEXINIT proposal [preauth]
debug2: KEX algorithms: 
curve25519-sha256,curve25519-sha...@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group18-sha512,diffie-hellman-group16-sha512,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1,ext-info-c
 [preauth]
debug2: host key algorithms: 
ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ssh-dss
 [preauth]
debug2: ciphers ctos: 
aes256-...@openssh.com,aes128-...@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr,aes256-cbc,aes192-cbc,aes128-cbc,3des-cbc
 [preauth]
debug2: ciphers stoc: 
aes256-...@openssh.com,aes128-...@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr,aes256-cbc,aes192-cbc,aes128-cbc,3des-cbc
 [preauth]
debug2: MACs ctos: 
hmac-sha2-256-...@openssh.com,hmac-sha2-512-...@openssh.com,hmac-sha1-...@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
 [preauth]
debug2: MACs stoc: 
hmac-sha2-256-...@openssh.com,hmac-sha2-512-...@openssh.com,hmac-sha1-...@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
 [preauth]
debug2: compression ctos: none [preauth]
debug2: compression stoc: none [preauth]
debug2: languages ctos:  [preauth]
debug2: languages stoc:  [preauth]
debug2: first_kex_follows 0  [preauth]
debug2: reserved 0  [preauth]
debug1: kex: algorithm: curve25519-sha256 [preauth]
debug1: kex: host key algorithm: ecdsa-sha2-nistp256 [preauth]
debug1: kex: client->server cipher: aes256-...@openssh.com MAC: <implicit> 
compression: none [preauth]
debug1: kex: server->client cipher: aes256-...@openssh.com MAC: <implicit> 
compression: none [preauth]
debug1: kex: curve25519-sha256 need=32 dh_need=32 [preauth]
debug3: mm_request_send entering: type 120 [preauth]
debug3: mm_request_receive_expect entering: type 121 [preauth]
debug3: mm_request_receive entering [preauth]
debug3: mm_request_receive entering
debug3: monitor_read: checking request 120
debug3: mm_request_send entering: type 121
debug1: kex: curve25519-sha256 need=32 dh_need=32 [preauth]
debug3: mm_request_send entering: type 120 [preauth]
debug3: mm_request_receive_expect entering: type 121 [preauth]
debug3: mm_request_receive entering [preauth]
debug3: mm_request_receive entering
debug3: monitor_read: checking request 120
debug3: mm_request_send entering: type 121
debug1: expecting SSH2_MSG_KEX_ECDH_INIT [preauth]
debug3: receive packet: type 30 [preauth]
debug3: mm_sshkey_sign entering [preauth]
debug3: mm_request_send entering: type 6 [preauth]
debug3: mm_sshkey_sign: waiting for MONITOR_ANS_SIGN [preauth]
debug3: mm_request_receive_expect entering: type 7 [preauth]
debug3: mm_request_receive entering [preauth]
debug3: mm_request_receive entering
debug3: monitor_read: checking request 6
debug3: mm_answer_sign
debug3: mm_answer_sign: hostkey proof signature 0x55ed710cf180(99)
debug3: mm_request_send entering: type 7
debug2: monitor_read: 6 used once, disabling now
debug3: send packet: type 31 [preauth]
debug3: send packet: type 21 [preauth]
debug2: set_newkeys: mode 1 [preauth]
debug1: rekey out after 4294967296 blocks [preauth]
debug1: SSH2_MSG_NEWKEYS sent [preauth]
debug1: expecting SSH2_MSG_NEWKEYS [preauth]
debug3: send packet: type 7 [preauth]
debug3: receive packet: type 21 [preauth]
debug1: SSH2_MSG_NEWKEYS received [preauth]
debug2: set_newkeys: mode 0 [preauth]
debug1: rekey in after 4294967296 blocks [preauth]
debug1: KEX done [preauth]
debug3: receive packet: type 5 [preauth]
debug3: send packet: type 6 [preauth]
debug3: receive packet: type 50 [preauth]
debug1: userauth-request for user hpverne service ssh-connection method none 
[preauth]
debug1: attempt 0 failures 0 [preauth]
debug3: mm_getpwnamallow entering [preauth]
debug3: mm_request_send entering: type 8 [preauth]
debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM [preauth]
debug3: mm_request_receive_expect entering: type 9 [preauth]
debug3: mm_request_receive entering [preauth]
debug3: mm_request_receive entering
debug3: monitor_read: checking request 8
debug3: mm_answer_pwnamallow
debug3: Trying to reverse map address 2001:700:100:4029:a83d:8cee:2dcf:d70e.
debug2: parse_server_config: config reprocess config len 1247
debug3: checking match for 'Address 127.0.0.0/8' user hpverne host 
2001:700:100:4029:a83d:8cee:2dcf:d70e addr 
2001:700:100:4029:a83d:8cee:2dcf:d70e laddr 2001:700:100:118::101 lport 443
debug3: match not found
debug3: checking match for 'Address ::1/128' user hpverne host 
2001:700:100:4029:a83d:8cee:2dcf:d70e addr 
2001:700:100:4029:a83d:8cee:2dcf:d70e laddr 2001:700:100:118::101 lport 443
debug3: match not found
debug3: checking match for 'Address 129.240.0.0/16' user hpverne host 
2001:700:100:4029:a83d:8cee:2dcf:d70e addr 
2001:700:100:4029:a83d:8cee:2dcf:d70e laddr 2001:700:100:118::101 lport 443
debug3: match not found
debug3: checking match for 'Address 158.36.5.0/24' user hpverne host 
2001:700:100:4029:a83d:8cee:2dcf:d70e addr 
2001:700:100:4029:a83d:8cee:2dcf:d70e laddr 2001:700:100:118::101 lport 443
debug3: match not found
debug3: checking match for 'Address 193.157.128.0/17' user hpverne host 
2001:700:100:4029:a83d:8cee:2dcf:d70e addr 
2001:700:100:4029:a83d:8cee:2dcf:d70e laddr 2001:700:100:118::101 lport 443
debug3: match not found
debug3: checking match for 'Address 2001:700:100::/40' user hpverne host 
2001:700:100:4029:a83d:8cee:2dcf:d70e addr 
2001:700:100:4029:a83d:8cee:2dcf:d70e laddr 2001:700:100:118::101 lport 443
debug1: connection from 2001:700:100:4029:a83d:8cee:2dcf:d70e matched 'Address 
2001:700:100::/40' at line 169
debug3: match found
debug3: reprocess config:170 setting PermitRootLogin yes
debug3: checking match for 'Address 2001:700:5800:10::/64' user hpverne host 
2001:700:100:4029:a83d:8cee:2dcf:d70e addr 
2001:700:100:4029:a83d:8cee:2dcf:d70e laddr 2001:700:100:118::101 lport 443
debug3: match not found
debug3: checking match for 'Address fe80::/10' user hpverne host 
2001:700:100:4029:a83d:8cee:2dcf:d70e addr 
2001:700:100:4029:a83d:8cee:2dcf:d70e laddr 2001:700:100:118::101 lport 443
debug3: match not found
debug3: checking match for 'Address 10.0.0.0/8' user hpverne host 
2001:700:100:4029:a83d:8cee:2dcf:d70e addr 
2001:700:100:4029:a83d:8cee:2dcf:d70e laddr 2001:700:100:118::101 lport 443
debug3: match not found
debug3: checking match for 'Address 172.16.0.0/12' user hpverne host 
2001:700:100:4029:a83d:8cee:2dcf:d70e addr 
2001:700:100:4029:a83d:8cee:2dcf:d70e laddr 2001:700:100:118::101 lport 443
debug3: match not found
debug3: checking match for 'Address 192.168.0.0/16' user hpverne host 
2001:700:100:4029:a83d:8cee:2dcf:d70e addr 
2001:700:100:4029:a83d:8cee:2dcf:d70e laddr 2001:700:100:118::101 lport 443
debug3: match not found
debug3: checking match for 'User oracle' user hpverne host 
2001:700:100:4029:a83d:8cee:2dcf:d70e addr 
2001:700:100:4029:a83d:8cee:2dcf:d70e laddr 2001:700:100:118::101 lport 443
debug3: match not found
debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1
debug3: mm_request_send entering: type 9
debug2: monitor_read: 8 used once, disabling now
debug2: input_userauth_request: setting up authctxt for hpverne [preauth]
debug3: mm_start_pam entering [preauth]
debug3: mm_request_send entering: type 100 [preauth]
debug3: mm_inform_authserv entering [preauth]
debug3: mm_request_send entering: type 4 [preauth]
debug3: mm_inform_authrole entering [preauth]
debug3: mm_request_send entering: type 80 [preauth]
debug2: input_userauth_request: try method none [preauth]
debug3: user_specific_delay: user specific delay 0.000ms [preauth]
debug3: ensure_minimum_time_since: elapsed 1.718ms, delaying 6.888ms (requested 
8.606ms) [preauth]
debug3: mm_request_receive entering
debug3: monitor_read: checking request 100
debug1: PAM: initializing for "hpverne"
debug1: PAM: setting PAM_RHOST to "2001:700:100:4029:a83d:8cee:2dcf:d70e"
debug1: PAM: setting PAM_TTY to "ssh"
debug2: monitor_read: 100 used once, disabling now
debug3: mm_request_receive entering
debug3: monitor_read: checking request 4
debug3: mm_answer_authserv: service=ssh-connection, style=
debug2: monitor_read: 4 used once, disabling now
debug3: mm_request_receive entering
debug3: monitor_read: checking request 80
debug3: mm_answer_authrole: role=
debug2: monitor_read: 80 used once, disabling now
debug3: userauth_finish: failure partial=0 next methods="publickey,password" 
[preauth]
debug3: send packet: type 51 [preauth]
debug3: receive packet: type 50 [preauth]
debug1: userauth-request for user hpverne service ssh-connection method 
password [preauth]
debug1: attempt 1 failures 0 [preauth]
debug2: input_userauth_request: try method password [preauth]
debug3: mm_auth_password entering [preauth]
debug3: mm_request_send entering: type 12 [preauth]
debug3: mm_auth_password: waiting for MONITOR_ANS_AUTHPASSWORD [preauth]
debug3: mm_request_receive_expect entering: type 13 [preauth]
debug3: mm_request_receive entering [preauth]
debug3: mm_request_receive entering
debug3: monitor_read: checking request 12
debug3: PAM: sshpam_passwd_conv called with 1 messages
debug1: PAM: password authentication failed for hpverne: Authentication failure
debug3: mm_answer_authpassword: sending result 0
debug3: mm_request_send entering: type 13
Failed password for hpverne from 2001:700:100:4029:a83d:8cee:2dcf:d70e port 
60020 ssh2
debug3: mm_auth_password: user not authenticated [preauth]
debug3: user_specific_delay: user specific delay 0.000ms [preauth]
debug3: ensure_minimum_time_since: elapsed 2099.726ms, delaying 103.431ms 
(requested 8.606ms) [preauth]
debug3: userauth_finish: failure partial=0 next methods="publickey,password" 
[preauth]
debug3: send packet: type 51 [preauth]
debug3: receive packet: type 1 [preauth]
Received disconnect from 2001:700:100:4029:a83d:8cee:2dcf:d70e port 60020:11: 
Bye Bye [preauth]
debug3: mm_request_send entering: type 122 [preauth]
debug3: mm_request_receive_expect entering: type 123 [preauth]
debug3: mm_request_receive entering [preauth]
debug3: mm_request_receive entering
debug3: monitor_read: checking request 122
debug3: mm_request_send entering: type 123
Disconnected from authenticating user hpverne 
2001:700:100:4029:a83d:8cee:2dcf:d70e port 60020 [preauth]
debug1: do_cleanup [preauth]
debug3: PAM: sshpam_thread_cleanup entering [preauth]
debug1: monitor_read_log: child log fd closed
debug3: mm_request_receive entering
debug1: do_cleanup
debug1: PAM: cleanup
debug3: PAM: sshpam_thread_cleanup entering
debug1: Killing privsep child 2434686
[root@mimi ~]# exit

Script done on 2021-08-05 15:36:36+02:00
Script started on 2021-08-05 15:31:14+02:00
[root@mimi ~]# /usr/sbin/sshd -ddd -p 443
debug2: load_server_config: filename /etc/ssh/sshd_config
debug2: load_server_config: done config len = 1247
debug2: parse_server_config: config /etc/ssh/sshd_config len 1247
debug3: /etc/ssh/sshd_config:25 setting Protocol 2
debug2: /etc/ssh/sshd_config line 25: Deprecated option Protocol
debug3: /etc/ssh/sshd_config:29 setting HostKey /etc/ssh/ssh_host_ecdsa_key
debug3: /etc/ssh/sshd_config:30 setting HostKey /etc/ssh/ssh_host_rsa_key
debug3: /etc/ssh/sshd_config:38 setting SyslogFacility AUTH
debug3: /etc/ssh/sshd_config:40 setting LogLevel VERBOSE
debug3: /etc/ssh/sshd_config:69 setting PasswordAuthentication yes
debug3: /etc/ssh/sshd_config:73 setting ChallengeResponseAuthentication no
debug3: /etc/ssh/sshd_config:99 setting UsePAM yes
debug3: /etc/ssh/sshd_config:102 setting AcceptEnv LANG LC_CTYPE LC_NUMERIC 
LC_TIME LC_COLLATE LC_MONETARY LC_MESSAGES
debug3: /etc/ssh/sshd_config:103 setting AcceptEnv LC_PAPER LC_NAME LC_ADDRESS 
LC_TELEPHONE LC_MEASUREMENT
debug3: /etc/ssh/sshd_config:104 setting AcceptEnv LC_IDENTIFICATION LC_ALL 
LANGUAGE
debug3: /etc/ssh/sshd_config:105 setting AcceptEnv XMODIFIERS
debug3: /etc/ssh/sshd_config:106 setting AcceptEnv SUDO_USER
debug3: /etc/ssh/sshd_config:112 setting X11Forwarding yes
debug3: /etc/ssh/sshd_config:124 setting UseDNS yes
debug3: /etc/ssh/sshd_config:134 setting Subsystem sftp 
/usr/libexec/openssh/sftp-server
debug3: /etc/ssh/sshd_config:146 setting PermitRootLogin no
debug3: checking syntax for 'Match Address 127.0.0.0/8'
debug3: checking syntax for 'Match Address ::1/128'
debug3: checking syntax for 'Match Address 129.240.0.0/16'
debug3: checking syntax for 'Match Address 158.36.5.0/24'
debug3: checking syntax for 'Match Address 193.157.128.0/17'
debug3: checking syntax for 'Match Address 2001:700:100::/40'
debug3: checking syntax for 'Match Address 2001:700:5800:10::/64'
debug3: checking syntax for 'Match Address fe80::/10'
debug3: checking syntax for 'Match Address 10.0.0.0/8'
debug3: checking syntax for 'Match Address 172.16.0.0/12'
debug3: checking syntax for 'Match Address 192.168.0.0/16'
debug3: checking syntax for 'Match User oracle'
debug1: sshd version OpenSSH_8.0, OpenSSL 1.1.1g FIPS  21 Apr 2020
debug1: private host key #0: ecdsa-sha2-nistp256 SHA256:(removed)
debug1: private host key #1: ssh-rsa SHA256:(removed)
debug1: rexec_argv[0]='/usr/sbin/sshd'
debug1: rexec_argv[1]='-ddd'
debug1: rexec_argv[2]='-p'
debug1: rexec_argv[3]='443'
debug3: oom_adjust_setup
debug1: Set /proc/self/oom_score_adj from 0 to -1000
debug2: fd 3 setting O_NONBLOCK
debug1: Bind to port 443 on 0.0.0.0.
Server listening on 0.0.0.0 port 443.
debug2: fd 4 setting O_NONBLOCK
debug3: sock_set_v6only: set socket 4 IPV6_V6ONLY
debug1: Bind to port 443 on ::.
Server listening on :: port 443.

debug3: fd 5 is not O_NONBLOCK
debug1: Server will not fork when running in debugging mode.
debug3: send_rexec_state: entering fd = 8 config len 1247
debug3: ssh_msg_send: type 0
debug3: send_rexec_state: done
debug1: rexec start in 5 out 5 newsock 5 pipe -1 sock 8
debug1: inetd sockets after dupping: 3, 3
Connection from 2001:700:100:4029:a83d:8cee:2dcf:d70e port 57618 on 
2001:700:100:118::101 port 443
debug1: Local version string SSH-2.0-OpenSSH_8.0
debug1: Remote protocol version 2.0, remote software version libssh_0.9.3
debug1: no match: libssh_0.9.3
debug2: fd 3 setting O_NONBLOCK
debug3: ssh_sandbox_init: preparing seccomp filter sandbox
debug2: Network child is on pid 2432906
debug3: preauth child monitor started
debug1: SELinux support enabled [preauth]
debug1: ssh_selinux_change_context: setting context from 
'unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023' to 
'unconfined_u:unconfined_r:sshd_net_t:s0-s0:c0.c1023' [preauth]
debug3: ssh_selinux_change_context: setcon 
unconfined_u:unconfined_r:sshd_net_t:s0-s0:c0.c1023 from 
unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 failed with Invalid 
argument [preauth]
debug3: privsep user:group 74:74 [preauth]
debug1: permanently_set_uid: 74/74 [preauth]
debug3: ssh_sandbox_child: setting PR_SET_NO_NEW_PRIVS [preauth]
debug3: ssh_sandbox_child: attaching seccomp filter program [preauth]
debug1: list_hostkey_types: 
ecdsa-sha2-nistp256,rsa-sha2-512,rsa-sha2-256,ssh-rsa [preauth]
debug3: send packet: type 20 [preauth]
debug1: SSH2_MSG_KEXINIT sent [preauth]
debug3: receive packet: type 20 [preauth]
debug1: SSH2_MSG_KEXINIT received [preauth]
debug2: local server KEXINIT proposal [preauth]
debug2: KEX algorithms: 
curve25519-sha256,curve25519-sha...@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1
 [preauth]
debug2: host key algorithms: 
ecdsa-sha2-nistp256,rsa-sha2-512,rsa-sha2-256,ssh-rsa [preauth]
debug2: ciphers ctos: 
chacha20-poly1...@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-...@openssh.com,aes256-...@openssh.com
 [preauth]
debug2: ciphers stoc: 
chacha20-poly1...@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-...@openssh.com,aes256-...@openssh.com
 [preauth]
debug2: MACs ctos: 
umac-64-...@openssh.com,umac-128-...@openssh.com,hmac-sha2-256-...@openssh.com,hmac-sha2-512-...@openssh.com,hmac-sha1-...@openssh.com,umac...@openssh.com,umac-...@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
 [preauth]
debug2: MACs stoc: 
umac-64-...@openssh.com,umac-128-...@openssh.com,hmac-sha2-256-...@openssh.com,hmac-sha2-512-...@openssh.com,hmac-sha1-...@openssh.com,umac...@openssh.com,umac-...@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
 [preauth]
debug2: compression ctos: none,z...@openssh.com [preauth]
debug2: compression stoc: none,z...@openssh.com [preauth]
debug2: languages ctos:  [preauth]
debug2: languages stoc:  [preauth]
debug2: first_kex_follows 0  [preauth]
debug2: reserved 0  [preauth]
debug2: peer client KEXINIT proposal [preauth]
debug2: KEX algorithms: 
curve25519-sha256,curve25519-sha...@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group18-sha512,diffie-hellman-group16-sha512,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1,ext-info-c
 [preauth]
debug2: host key algorithms: 
ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ssh-dss
 [preauth]
debug2: ciphers ctos: 
aes256-...@openssh.com,aes128-...@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr,aes256-cbc,aes192-cbc,aes128-cbc,3des-cbc
 [preauth]
debug2: ciphers stoc: 
aes256-...@openssh.com,aes128-...@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr,aes256-cbc,aes192-cbc,aes128-cbc,3des-cbc
 [preauth]
debug2: MACs ctos: 
hmac-sha2-256-...@openssh.com,hmac-sha2-512-...@openssh.com,hmac-sha1-...@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
 [preauth]
debug2: MACs stoc: 
hmac-sha2-256-...@openssh.com,hmac-sha2-512-...@openssh.com,hmac-sha1-...@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
 [preauth]
debug2: compression ctos: none [preauth]
debug2: compression stoc: none [preauth]
debug2: languages ctos:  [preauth]
debug2: languages stoc:  [preauth]
debug2: first_kex_follows 0  [preauth]
debug2: reserved 0  [preauth]
debug1: kex: algorithm: curve25519-sha256 [preauth]
debug1: kex: host key algorithm: ecdsa-sha2-nistp256 [preauth]
debug1: kex: client->server cipher: aes256-...@openssh.com MAC: <implicit> 
compression: none [preauth]
debug1: kex: server->client cipher: aes256-...@openssh.com MAC: <implicit> 
compression: none [preauth]
debug1: kex: curve25519-sha256 need=32 dh_need=32 [preauth]
debug3: mm_request_send entering: type 120 [preauth]
debug3: mm_request_receive_expect entering: type 121 [preauth]
debug3: mm_request_receive entering [preauth]
debug3: mm_request_receive entering
debug3: monitor_read: checking request 120
debug3: mm_request_send entering: type 121
debug1: kex: curve25519-sha256 need=32 dh_need=32 [preauth]
debug3: mm_request_send entering: type 120 [preauth]
debug3: mm_request_receive_expect entering: type 121 [preauth]
debug3: mm_request_receive entering [preauth]
debug3: mm_request_receive entering
debug3: monitor_read: checking request 120
debug3: mm_request_send entering: type 121
debug1: expecting SSH2_MSG_KEX_ECDH_INIT [preauth]
debug3: receive packet: type 30 [preauth]
debug3: mm_sshkey_sign entering [preauth]
debug3: mm_request_send entering: type 6 [preauth]
debug3: mm_sshkey_sign: waiting for MONITOR_ANS_SIGN [preauth]
debug3: mm_request_receive_expect entering: type 7 [preauth]
debug3: mm_request_receive entering [preauth]
debug3: mm_request_receive entering
debug3: monitor_read: checking request 6
debug3: mm_answer_sign
debug3: mm_answer_sign: hostkey proof signature 0x557b97ee7180(100)
debug3: mm_request_send entering: type 7
debug2: monitor_read: 6 used once, disabling now
debug3: send packet: type 31 [preauth]
debug3: send packet: type 21 [preauth]
debug2: set_newkeys: mode 1 [preauth]
debug1: rekey out after 4294967296 blocks [preauth]
debug1: SSH2_MSG_NEWKEYS sent [preauth]
debug1: expecting SSH2_MSG_NEWKEYS [preauth]
debug3: send packet: type 7 [preauth]
debug3: receive packet: type 21 [preauth]
debug1: SSH2_MSG_NEWKEYS received [preauth]
debug2: set_newkeys: mode 0 [preauth]
debug1: rekey in after 4294967296 blocks [preauth]
debug1: KEX done [preauth]
debug3: mm_request_send entering: type 122 [preauth]
debug3: mm_request_receive_expect entering: type 123 [preauth]
debug3: mm_request_receive entering [preauth]
debug3: mm_request_receive entering
debug3: monitor_read: checking request 122
debug3: mm_request_send entering: type 123
Connection reset by 2001:700:100:4029:a83d:8cee:2dcf:d70e port 57618 [preauth]
debug1: do_cleanup [preauth]
debug3: PAM: sshpam_thread_cleanup entering [preauth]
debug1: monitor_read_log: child log fd closed
debug3: mm_request_receive entering
debug1: do_cleanup
debug3: PAM: sshpam_thread_cleanup entering
debug1: Killing privsep child 2432906
[root@mimi ~]# exit

Script done on 2021-08-05 15:32:30+02:00
_______________________________________________
x2go-dev mailing list
x2go-dev@lists.x2go.org
https://lists.x2go.org/listinfo/x2go-dev

Reply via email to