Package: x2goclient Version: 4.1.2.2 Hello, devs!
I'm afraid this is not a very precise bug report. Any assistance in how to investigate this is appreciated. We're running x2goclient 4.1.2.2 on Windows-10 machines, this has served us well up to now. With our new RedHat Enterprise Server 8.4 in production, we see the client crashing very often. When the client crashes, it does so shortly after trying to log in to a new or existing session. The clients "show details" window pane is activated, but the client dies before anything can be seen there. On the server, just these entries in the system logs appears: Aug 05 14:42:56 mimi.uio.no sshd[2421324]: Connection from 2001:700:100:4028:9462:e3c7:21c5:ec1c port 49763 on 2001:700:100:118::101 port 22 Aug 05 14:42:59 mimi.uio.no sshd[2421324]: Connection reset by 2001:700:100:4028:9462:e3c7:21c5:ec1c port 49763 [preauth] If I disable IPv6: Aug 05 14:45:30 mimi.uio.no sshd[2421601]: Connection from 193.157.161.44 port 57619 on 129.240.118.101 port 22 Aug 05 14:45:33 mimi.uio.no sshd[2421601]: Connection reset by 193.157.161.44 port 57619 [preauth] Note the absence of the "Fail password for ..." log entry. It looks like it never gets to even try authenticating. There is no problem logging in with putty from the same client machine, both with IPv6 and IPv4. Neither have I had this problem (at least not so frequent) with the Linux client. The server is running sshd and x2goserver from the RHEL8/EPEL repos, packages openssh-server-8.0p1-6 and x2goserver-4.1.0.3-9, respectively. I eventually tried to run sshd -ddd on the server and catch the output. The typescripts are attached (slightly edited): one where the client crashed; and one where it didn't (but couldn't authenticate, bad password). I'm no expert on ssh, but it seems like the difference appears after the key exchange ("KEX done"), when the instance that crashed never reaches the bit with userauth-request. I also tried "setenforce 0" on the server, i.e. disable SELinux, but the client still crashed. As it is, I can't clearly provide a procedure to reproduce the problem, as it doesn't always happen. If more information is required, or there are suggested steps to take, please let me know. Thanks in advance, and best regards, -- Hans Peter Verne -- IT-drift Geofag. In 1934, Van der Lubbe was beheaded in a German prison yard. In 1967, a court in West Berlin overturned the 1933 verdict, and posthumously changed Van der Lubbe's sentence to eight years in prison. -- "Reichstag fire" on Wikipedia.
Script started on 2021-08-05 15:36:21+02:00 [root@mimi ~]# /usr/sbin/sshd -ddd -p 443 debug2: load_server_config: filename /etc/ssh/sshd_config debug2: load_server_config: done config len = 1247 debug2: parse_server_config: config /etc/ssh/sshd_config len 1247 debug3: /etc/ssh/sshd_config:25 setting Protocol 2 debug2: /etc/ssh/sshd_config line 25: Deprecated option Protocol debug3: /etc/ssh/sshd_config:29 setting HostKey /etc/ssh/ssh_host_ecdsa_key debug3: /etc/ssh/sshd_config:30 setting HostKey /etc/ssh/ssh_host_rsa_key debug3: /etc/ssh/sshd_config:38 setting SyslogFacility AUTH debug3: /etc/ssh/sshd_config:40 setting LogLevel VERBOSE debug3: /etc/ssh/sshd_config:69 setting PasswordAuthentication yes debug3: /etc/ssh/sshd_config:73 setting ChallengeResponseAuthentication no debug3: /etc/ssh/sshd_config:99 setting UsePAM yes debug3: /etc/ssh/sshd_config:102 setting AcceptEnv LANG LC_CTYPE LC_NUMERIC LC_TIME LC_COLLATE LC_MONETARY LC_MESSAGES debug3: /etc/ssh/sshd_config:103 setting AcceptEnv LC_PAPER LC_NAME LC_ADDRESS LC_TELEPHONE LC_MEASUREMENT debug3: /etc/ssh/sshd_config:104 setting AcceptEnv LC_IDENTIFICATION LC_ALL LANGUAGE debug3: /etc/ssh/sshd_config:105 setting AcceptEnv XMODIFIERS debug3: /etc/ssh/sshd_config:106 setting AcceptEnv SUDO_USER debug3: /etc/ssh/sshd_config:112 setting X11Forwarding yes debug3: /etc/ssh/sshd_config:124 setting UseDNS yes debug3: /etc/ssh/sshd_config:134 setting Subsystem sftp /usr/libexec/openssh/sftp-server debug3: /etc/ssh/sshd_config:146 setting PermitRootLogin no debug3: checking syntax for 'Match Address 127.0.0.0/8' debug3: checking syntax for 'Match Address ::1/128' debug3: checking syntax for 'Match Address 129.240.0.0/16' debug3: checking syntax for 'Match Address 158.36.5.0/24' debug3: checking syntax for 'Match Address 193.157.128.0/17' debug3: checking syntax for 'Match Address 2001:700:100::/40' debug3: checking syntax for 'Match Address 2001:700:5800:10::/64' debug3: checking syntax for 'Match Address fe80::/10' debug3: checking syntax for 'Match Address 10.0.0.0/8' debug3: checking syntax for 'Match Address 172.16.0.0/12' debug3: checking syntax for 'Match Address 192.168.0.0/16' debug3: checking syntax for 'Match User oracle' debug1: sshd version OpenSSH_8.0, OpenSSL 1.1.1g FIPS 21 Apr 2020 debug1: private host key #0: ecdsa-sha2-nistp256 SHA256:(removed) debug1: private host key #1: ssh-rsa SHA256:(removed) debug1: rexec_argv[0]='/usr/sbin/sshd' debug1: rexec_argv[1]='-ddd' debug1: rexec_argv[2]='-p' debug1: rexec_argv[3]='443' debug3: oom_adjust_setup debug1: Set /proc/self/oom_score_adj from 0 to -1000 debug2: fd 3 setting O_NONBLOCK debug1: Bind to port 443 on 0.0.0.0. Server listening on 0.0.0.0 port 443. debug2: fd 4 setting O_NONBLOCK debug3: sock_set_v6only: set socket 4 IPV6_V6ONLY debug1: Bind to port 443 on ::. Server listening on :: port 443. debug3: fd 5 is not O_NONBLOCK debug1: Server will not fork when running in debugging mode. debug3: send_rexec_state: entering fd = 8 config len 1247 debug3: ssh_msg_send: type 0 debug3: send_rexec_state: done debug1: rexec start in 5 out 5 newsock 5 pipe -1 sock 8 debug1: inetd sockets after dupping: 3, 3 Connection from 2001:700:100:4029:a83d:8cee:2dcf:d70e port 60020 on 2001:700:100:118::101 port 443 debug1: Local version string SSH-2.0-OpenSSH_8.0 debug1: Remote protocol version 2.0, remote software version libssh_0.9.3 debug1: no match: libssh_0.9.3 debug2: fd 3 setting O_NONBLOCK debug3: ssh_sandbox_init: preparing seccomp filter sandbox debug2: Network child is on pid 2434686 debug3: preauth child monitor started debug1: SELinux support enabled [preauth] debug1: ssh_selinux_change_context: setting context from 'unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023' to 'unconfined_u:unconfined_r:sshd_net_t:s0-s0:c0.c1023' [preauth] debug3: ssh_selinux_change_context: setcon unconfined_u:unconfined_r:sshd_net_t:s0-s0:c0.c1023 from unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 failed with Invalid argument [preauth] debug3: privsep user:group 74:74 [preauth] debug1: permanently_set_uid: 74/74 [preauth] debug3: ssh_sandbox_child: setting PR_SET_NO_NEW_PRIVS [preauth] debug3: ssh_sandbox_child: attaching seccomp filter program [preauth] debug1: list_hostkey_types: ecdsa-sha2-nistp256,rsa-sha2-512,rsa-sha2-256,ssh-rsa [preauth] debug3: send packet: type 20 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug3: receive packet: type 20 [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] debug2: local server KEXINIT proposal [preauth] debug2: KEX algorithms: curve25519-sha256,curve25519-sha...@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1 [preauth] debug2: host key algorithms: ecdsa-sha2-nistp256,rsa-sha2-512,rsa-sha2-256,ssh-rsa [preauth] debug2: ciphers ctos: chacha20-poly1...@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-...@openssh.com,aes256-...@openssh.com [preauth] debug2: ciphers stoc: chacha20-poly1...@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-...@openssh.com,aes256-...@openssh.com [preauth] debug2: MACs ctos: umac-64-...@openssh.com,umac-128-...@openssh.com,hmac-sha2-256-...@openssh.com,hmac-sha2-512-...@openssh.com,hmac-sha1-...@openssh.com,umac...@openssh.com,umac-...@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth] debug2: MACs stoc: umac-64-...@openssh.com,umac-128-...@openssh.com,hmac-sha2-256-...@openssh.com,hmac-sha2-512-...@openssh.com,hmac-sha1-...@openssh.com,umac...@openssh.com,umac-...@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth] debug2: compression ctos: none,z...@openssh.com [preauth] debug2: compression stoc: none,z...@openssh.com [preauth] debug2: languages ctos: [preauth] debug2: languages stoc: [preauth] debug2: first_kex_follows 0 [preauth] debug2: reserved 0 [preauth] debug2: peer client KEXINIT proposal [preauth] debug2: KEX algorithms: curve25519-sha256,curve25519-sha...@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group18-sha512,diffie-hellman-group16-sha512,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1,ext-info-c [preauth] debug2: host key algorithms: ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ssh-dss [preauth] debug2: ciphers ctos: aes256-...@openssh.com,aes128-...@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr,aes256-cbc,aes192-cbc,aes128-cbc,3des-cbc [preauth] debug2: ciphers stoc: aes256-...@openssh.com,aes128-...@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr,aes256-cbc,aes192-cbc,aes128-cbc,3des-cbc [preauth] debug2: MACs ctos: hmac-sha2-256-...@openssh.com,hmac-sha2-512-...@openssh.com,hmac-sha1-...@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth] debug2: MACs stoc: hmac-sha2-256-...@openssh.com,hmac-sha2-512-...@openssh.com,hmac-sha1-...@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth] debug2: compression ctos: none [preauth] debug2: compression stoc: none [preauth] debug2: languages ctos: [preauth] debug2: languages stoc: [preauth] debug2: first_kex_follows 0 [preauth] debug2: reserved 0 [preauth] debug1: kex: algorithm: curve25519-sha256 [preauth] debug1: kex: host key algorithm: ecdsa-sha2-nistp256 [preauth] debug1: kex: client->server cipher: aes256-...@openssh.com MAC: <implicit> compression: none [preauth] debug1: kex: server->client cipher: aes256-...@openssh.com MAC: <implicit> compression: none [preauth] debug1: kex: curve25519-sha256 need=32 dh_need=32 [preauth] debug3: mm_request_send entering: type 120 [preauth] debug3: mm_request_receive_expect entering: type 121 [preauth] debug3: mm_request_receive entering [preauth] debug3: mm_request_receive entering debug3: monitor_read: checking request 120 debug3: mm_request_send entering: type 121 debug1: kex: curve25519-sha256 need=32 dh_need=32 [preauth] debug3: mm_request_send entering: type 120 [preauth] debug3: mm_request_receive_expect entering: type 121 [preauth] debug3: mm_request_receive entering [preauth] debug3: mm_request_receive entering debug3: monitor_read: checking request 120 debug3: mm_request_send entering: type 121 debug1: expecting SSH2_MSG_KEX_ECDH_INIT [preauth] debug3: receive packet: type 30 [preauth] debug3: mm_sshkey_sign entering [preauth] debug3: mm_request_send entering: type 6 [preauth] debug3: mm_sshkey_sign: waiting for MONITOR_ANS_SIGN [preauth] debug3: mm_request_receive_expect entering: type 7 [preauth] debug3: mm_request_receive entering [preauth] debug3: mm_request_receive entering debug3: monitor_read: checking request 6 debug3: mm_answer_sign debug3: mm_answer_sign: hostkey proof signature 0x55ed710cf180(99) debug3: mm_request_send entering: type 7 debug2: monitor_read: 6 used once, disabling now debug3: send packet: type 31 [preauth] debug3: send packet: type 21 [preauth] debug2: set_newkeys: mode 1 [preauth] debug1: rekey out after 4294967296 blocks [preauth] debug1: SSH2_MSG_NEWKEYS sent [preauth] debug1: expecting SSH2_MSG_NEWKEYS [preauth] debug3: send packet: type 7 [preauth] debug3: receive packet: type 21 [preauth] debug1: SSH2_MSG_NEWKEYS received [preauth] debug2: set_newkeys: mode 0 [preauth] debug1: rekey in after 4294967296 blocks [preauth] debug1: KEX done [preauth] debug3: receive packet: type 5 [preauth] debug3: send packet: type 6 [preauth] debug3: receive packet: type 50 [preauth] debug1: userauth-request for user hpverne service ssh-connection method none [preauth] debug1: attempt 0 failures 0 [preauth] debug3: mm_getpwnamallow entering [preauth] debug3: mm_request_send entering: type 8 [preauth] debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM [preauth] debug3: mm_request_receive_expect entering: type 9 [preauth] debug3: mm_request_receive entering [preauth] debug3: mm_request_receive entering debug3: monitor_read: checking request 8 debug3: mm_answer_pwnamallow debug3: Trying to reverse map address 2001:700:100:4029:a83d:8cee:2dcf:d70e. debug2: parse_server_config: config reprocess config len 1247 debug3: checking match for 'Address 127.0.0.0/8' user hpverne host 2001:700:100:4029:a83d:8cee:2dcf:d70e addr 2001:700:100:4029:a83d:8cee:2dcf:d70e laddr 2001:700:100:118::101 lport 443 debug3: match not found debug3: checking match for 'Address ::1/128' user hpverne host 2001:700:100:4029:a83d:8cee:2dcf:d70e addr 2001:700:100:4029:a83d:8cee:2dcf:d70e laddr 2001:700:100:118::101 lport 443 debug3: match not found debug3: checking match for 'Address 129.240.0.0/16' user hpverne host 2001:700:100:4029:a83d:8cee:2dcf:d70e addr 2001:700:100:4029:a83d:8cee:2dcf:d70e laddr 2001:700:100:118::101 lport 443 debug3: match not found debug3: checking match for 'Address 158.36.5.0/24' user hpverne host 2001:700:100:4029:a83d:8cee:2dcf:d70e addr 2001:700:100:4029:a83d:8cee:2dcf:d70e laddr 2001:700:100:118::101 lport 443 debug3: match not found debug3: checking match for 'Address 193.157.128.0/17' user hpverne host 2001:700:100:4029:a83d:8cee:2dcf:d70e addr 2001:700:100:4029:a83d:8cee:2dcf:d70e laddr 2001:700:100:118::101 lport 443 debug3: match not found debug3: checking match for 'Address 2001:700:100::/40' user hpverne host 2001:700:100:4029:a83d:8cee:2dcf:d70e addr 2001:700:100:4029:a83d:8cee:2dcf:d70e laddr 2001:700:100:118::101 lport 443 debug1: connection from 2001:700:100:4029:a83d:8cee:2dcf:d70e matched 'Address 2001:700:100::/40' at line 169 debug3: match found debug3: reprocess config:170 setting PermitRootLogin yes debug3: checking match for 'Address 2001:700:5800:10::/64' user hpverne host 2001:700:100:4029:a83d:8cee:2dcf:d70e addr 2001:700:100:4029:a83d:8cee:2dcf:d70e laddr 2001:700:100:118::101 lport 443 debug3: match not found debug3: checking match for 'Address fe80::/10' user hpverne host 2001:700:100:4029:a83d:8cee:2dcf:d70e addr 2001:700:100:4029:a83d:8cee:2dcf:d70e laddr 2001:700:100:118::101 lport 443 debug3: match not found debug3: checking match for 'Address 10.0.0.0/8' user hpverne host 2001:700:100:4029:a83d:8cee:2dcf:d70e addr 2001:700:100:4029:a83d:8cee:2dcf:d70e laddr 2001:700:100:118::101 lport 443 debug3: match not found debug3: checking match for 'Address 172.16.0.0/12' user hpverne host 2001:700:100:4029:a83d:8cee:2dcf:d70e addr 2001:700:100:4029:a83d:8cee:2dcf:d70e laddr 2001:700:100:118::101 lport 443 debug3: match not found debug3: checking match for 'Address 192.168.0.0/16' user hpverne host 2001:700:100:4029:a83d:8cee:2dcf:d70e addr 2001:700:100:4029:a83d:8cee:2dcf:d70e laddr 2001:700:100:118::101 lport 443 debug3: match not found debug3: checking match for 'User oracle' user hpverne host 2001:700:100:4029:a83d:8cee:2dcf:d70e addr 2001:700:100:4029:a83d:8cee:2dcf:d70e laddr 2001:700:100:118::101 lport 443 debug3: match not found debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1 debug3: mm_request_send entering: type 9 debug2: monitor_read: 8 used once, disabling now debug2: input_userauth_request: setting up authctxt for hpverne [preauth] debug3: mm_start_pam entering [preauth] debug3: mm_request_send entering: type 100 [preauth] debug3: mm_inform_authserv entering [preauth] debug3: mm_request_send entering: type 4 [preauth] debug3: mm_inform_authrole entering [preauth] debug3: mm_request_send entering: type 80 [preauth] debug2: input_userauth_request: try method none [preauth] debug3: user_specific_delay: user specific delay 0.000ms [preauth] debug3: ensure_minimum_time_since: elapsed 1.718ms, delaying 6.888ms (requested 8.606ms) [preauth] debug3: mm_request_receive entering debug3: monitor_read: checking request 100 debug1: PAM: initializing for "hpverne" debug1: PAM: setting PAM_RHOST to "2001:700:100:4029:a83d:8cee:2dcf:d70e" debug1: PAM: setting PAM_TTY to "ssh" debug2: monitor_read: 100 used once, disabling now debug3: mm_request_receive entering debug3: monitor_read: checking request 4 debug3: mm_answer_authserv: service=ssh-connection, style= debug2: monitor_read: 4 used once, disabling now debug3: mm_request_receive entering debug3: monitor_read: checking request 80 debug3: mm_answer_authrole: role= debug2: monitor_read: 80 used once, disabling now debug3: userauth_finish: failure partial=0 next methods="publickey,password" [preauth] debug3: send packet: type 51 [preauth] debug3: receive packet: type 50 [preauth] debug1: userauth-request for user hpverne service ssh-connection method password [preauth] debug1: attempt 1 failures 0 [preauth] debug2: input_userauth_request: try method password [preauth] debug3: mm_auth_password entering [preauth] debug3: mm_request_send entering: type 12 [preauth] debug3: mm_auth_password: waiting for MONITOR_ANS_AUTHPASSWORD [preauth] debug3: mm_request_receive_expect entering: type 13 [preauth] debug3: mm_request_receive entering [preauth] debug3: mm_request_receive entering debug3: monitor_read: checking request 12 debug3: PAM: sshpam_passwd_conv called with 1 messages debug1: PAM: password authentication failed for hpverne: Authentication failure debug3: mm_answer_authpassword: sending result 0 debug3: mm_request_send entering: type 13 Failed password for hpverne from 2001:700:100:4029:a83d:8cee:2dcf:d70e port 60020 ssh2 debug3: mm_auth_password: user not authenticated [preauth] debug3: user_specific_delay: user specific delay 0.000ms [preauth] debug3: ensure_minimum_time_since: elapsed 2099.726ms, delaying 103.431ms (requested 8.606ms) [preauth] debug3: userauth_finish: failure partial=0 next methods="publickey,password" [preauth] debug3: send packet: type 51 [preauth] debug3: receive packet: type 1 [preauth] Received disconnect from 2001:700:100:4029:a83d:8cee:2dcf:d70e port 60020:11: Bye Bye [preauth] debug3: mm_request_send entering: type 122 [preauth] debug3: mm_request_receive_expect entering: type 123 [preauth] debug3: mm_request_receive entering [preauth] debug3: mm_request_receive entering debug3: monitor_read: checking request 122 debug3: mm_request_send entering: type 123 Disconnected from authenticating user hpverne 2001:700:100:4029:a83d:8cee:2dcf:d70e port 60020 [preauth] debug1: do_cleanup [preauth] debug3: PAM: sshpam_thread_cleanup entering [preauth] debug1: monitor_read_log: child log fd closed debug3: mm_request_receive entering debug1: do_cleanup debug1: PAM: cleanup debug3: PAM: sshpam_thread_cleanup entering debug1: Killing privsep child 2434686 [root@mimi ~]# exit Script done on 2021-08-05 15:36:36+02:00
Script started on 2021-08-05 15:31:14+02:00 [root@mimi ~]# /usr/sbin/sshd -ddd -p 443 debug2: load_server_config: filename /etc/ssh/sshd_config debug2: load_server_config: done config len = 1247 debug2: parse_server_config: config /etc/ssh/sshd_config len 1247 debug3: /etc/ssh/sshd_config:25 setting Protocol 2 debug2: /etc/ssh/sshd_config line 25: Deprecated option Protocol debug3: /etc/ssh/sshd_config:29 setting HostKey /etc/ssh/ssh_host_ecdsa_key debug3: /etc/ssh/sshd_config:30 setting HostKey /etc/ssh/ssh_host_rsa_key debug3: /etc/ssh/sshd_config:38 setting SyslogFacility AUTH debug3: /etc/ssh/sshd_config:40 setting LogLevel VERBOSE debug3: /etc/ssh/sshd_config:69 setting PasswordAuthentication yes debug3: /etc/ssh/sshd_config:73 setting ChallengeResponseAuthentication no debug3: /etc/ssh/sshd_config:99 setting UsePAM yes debug3: /etc/ssh/sshd_config:102 setting AcceptEnv LANG LC_CTYPE LC_NUMERIC LC_TIME LC_COLLATE LC_MONETARY LC_MESSAGES debug3: /etc/ssh/sshd_config:103 setting AcceptEnv LC_PAPER LC_NAME LC_ADDRESS LC_TELEPHONE LC_MEASUREMENT debug3: /etc/ssh/sshd_config:104 setting AcceptEnv LC_IDENTIFICATION LC_ALL LANGUAGE debug3: /etc/ssh/sshd_config:105 setting AcceptEnv XMODIFIERS debug3: /etc/ssh/sshd_config:106 setting AcceptEnv SUDO_USER debug3: /etc/ssh/sshd_config:112 setting X11Forwarding yes debug3: /etc/ssh/sshd_config:124 setting UseDNS yes debug3: /etc/ssh/sshd_config:134 setting Subsystem sftp /usr/libexec/openssh/sftp-server debug3: /etc/ssh/sshd_config:146 setting PermitRootLogin no debug3: checking syntax for 'Match Address 127.0.0.0/8' debug3: checking syntax for 'Match Address ::1/128' debug3: checking syntax for 'Match Address 129.240.0.0/16' debug3: checking syntax for 'Match Address 158.36.5.0/24' debug3: checking syntax for 'Match Address 193.157.128.0/17' debug3: checking syntax for 'Match Address 2001:700:100::/40' debug3: checking syntax for 'Match Address 2001:700:5800:10::/64' debug3: checking syntax for 'Match Address fe80::/10' debug3: checking syntax for 'Match Address 10.0.0.0/8' debug3: checking syntax for 'Match Address 172.16.0.0/12' debug3: checking syntax for 'Match Address 192.168.0.0/16' debug3: checking syntax for 'Match User oracle' debug1: sshd version OpenSSH_8.0, OpenSSL 1.1.1g FIPS 21 Apr 2020 debug1: private host key #0: ecdsa-sha2-nistp256 SHA256:(removed) debug1: private host key #1: ssh-rsa SHA256:(removed) debug1: rexec_argv[0]='/usr/sbin/sshd' debug1: rexec_argv[1]='-ddd' debug1: rexec_argv[2]='-p' debug1: rexec_argv[3]='443' debug3: oom_adjust_setup debug1: Set /proc/self/oom_score_adj from 0 to -1000 debug2: fd 3 setting O_NONBLOCK debug1: Bind to port 443 on 0.0.0.0. Server listening on 0.0.0.0 port 443. debug2: fd 4 setting O_NONBLOCK debug3: sock_set_v6only: set socket 4 IPV6_V6ONLY debug1: Bind to port 443 on ::. Server listening on :: port 443. debug3: fd 5 is not O_NONBLOCK debug1: Server will not fork when running in debugging mode. debug3: send_rexec_state: entering fd = 8 config len 1247 debug3: ssh_msg_send: type 0 debug3: send_rexec_state: done debug1: rexec start in 5 out 5 newsock 5 pipe -1 sock 8 debug1: inetd sockets after dupping: 3, 3 Connection from 2001:700:100:4029:a83d:8cee:2dcf:d70e port 57618 on 2001:700:100:118::101 port 443 debug1: Local version string SSH-2.0-OpenSSH_8.0 debug1: Remote protocol version 2.0, remote software version libssh_0.9.3 debug1: no match: libssh_0.9.3 debug2: fd 3 setting O_NONBLOCK debug3: ssh_sandbox_init: preparing seccomp filter sandbox debug2: Network child is on pid 2432906 debug3: preauth child monitor started debug1: SELinux support enabled [preauth] debug1: ssh_selinux_change_context: setting context from 'unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023' to 'unconfined_u:unconfined_r:sshd_net_t:s0-s0:c0.c1023' [preauth] debug3: ssh_selinux_change_context: setcon unconfined_u:unconfined_r:sshd_net_t:s0-s0:c0.c1023 from unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 failed with Invalid argument [preauth] debug3: privsep user:group 74:74 [preauth] debug1: permanently_set_uid: 74/74 [preauth] debug3: ssh_sandbox_child: setting PR_SET_NO_NEW_PRIVS [preauth] debug3: ssh_sandbox_child: attaching seccomp filter program [preauth] debug1: list_hostkey_types: ecdsa-sha2-nistp256,rsa-sha2-512,rsa-sha2-256,ssh-rsa [preauth] debug3: send packet: type 20 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug3: receive packet: type 20 [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] debug2: local server KEXINIT proposal [preauth] debug2: KEX algorithms: curve25519-sha256,curve25519-sha...@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1 [preauth] debug2: host key algorithms: ecdsa-sha2-nistp256,rsa-sha2-512,rsa-sha2-256,ssh-rsa [preauth] debug2: ciphers ctos: chacha20-poly1...@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-...@openssh.com,aes256-...@openssh.com [preauth] debug2: ciphers stoc: chacha20-poly1...@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-...@openssh.com,aes256-...@openssh.com [preauth] debug2: MACs ctos: umac-64-...@openssh.com,umac-128-...@openssh.com,hmac-sha2-256-...@openssh.com,hmac-sha2-512-...@openssh.com,hmac-sha1-...@openssh.com,umac...@openssh.com,umac-...@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth] debug2: MACs stoc: umac-64-...@openssh.com,umac-128-...@openssh.com,hmac-sha2-256-...@openssh.com,hmac-sha2-512-...@openssh.com,hmac-sha1-...@openssh.com,umac...@openssh.com,umac-...@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth] debug2: compression ctos: none,z...@openssh.com [preauth] debug2: compression stoc: none,z...@openssh.com [preauth] debug2: languages ctos: [preauth] debug2: languages stoc: [preauth] debug2: first_kex_follows 0 [preauth] debug2: reserved 0 [preauth] debug2: peer client KEXINIT proposal [preauth] debug2: KEX algorithms: curve25519-sha256,curve25519-sha...@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group18-sha512,diffie-hellman-group16-sha512,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1,ext-info-c [preauth] debug2: host key algorithms: ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ssh-dss [preauth] debug2: ciphers ctos: aes256-...@openssh.com,aes128-...@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr,aes256-cbc,aes192-cbc,aes128-cbc,3des-cbc [preauth] debug2: ciphers stoc: aes256-...@openssh.com,aes128-...@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr,aes256-cbc,aes192-cbc,aes128-cbc,3des-cbc [preauth] debug2: MACs ctos: hmac-sha2-256-...@openssh.com,hmac-sha2-512-...@openssh.com,hmac-sha1-...@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth] debug2: MACs stoc: hmac-sha2-256-...@openssh.com,hmac-sha2-512-...@openssh.com,hmac-sha1-...@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth] debug2: compression ctos: none [preauth] debug2: compression stoc: none [preauth] debug2: languages ctos: [preauth] debug2: languages stoc: [preauth] debug2: first_kex_follows 0 [preauth] debug2: reserved 0 [preauth] debug1: kex: algorithm: curve25519-sha256 [preauth] debug1: kex: host key algorithm: ecdsa-sha2-nistp256 [preauth] debug1: kex: client->server cipher: aes256-...@openssh.com MAC: <implicit> compression: none [preauth] debug1: kex: server->client cipher: aes256-...@openssh.com MAC: <implicit> compression: none [preauth] debug1: kex: curve25519-sha256 need=32 dh_need=32 [preauth] debug3: mm_request_send entering: type 120 [preauth] debug3: mm_request_receive_expect entering: type 121 [preauth] debug3: mm_request_receive entering [preauth] debug3: mm_request_receive entering debug3: monitor_read: checking request 120 debug3: mm_request_send entering: type 121 debug1: kex: curve25519-sha256 need=32 dh_need=32 [preauth] debug3: mm_request_send entering: type 120 [preauth] debug3: mm_request_receive_expect entering: type 121 [preauth] debug3: mm_request_receive entering [preauth] debug3: mm_request_receive entering debug3: monitor_read: checking request 120 debug3: mm_request_send entering: type 121 debug1: expecting SSH2_MSG_KEX_ECDH_INIT [preauth] debug3: receive packet: type 30 [preauth] debug3: mm_sshkey_sign entering [preauth] debug3: mm_request_send entering: type 6 [preauth] debug3: mm_sshkey_sign: waiting for MONITOR_ANS_SIGN [preauth] debug3: mm_request_receive_expect entering: type 7 [preauth] debug3: mm_request_receive entering [preauth] debug3: mm_request_receive entering debug3: monitor_read: checking request 6 debug3: mm_answer_sign debug3: mm_answer_sign: hostkey proof signature 0x557b97ee7180(100) debug3: mm_request_send entering: type 7 debug2: monitor_read: 6 used once, disabling now debug3: send packet: type 31 [preauth] debug3: send packet: type 21 [preauth] debug2: set_newkeys: mode 1 [preauth] debug1: rekey out after 4294967296 blocks [preauth] debug1: SSH2_MSG_NEWKEYS sent [preauth] debug1: expecting SSH2_MSG_NEWKEYS [preauth] debug3: send packet: type 7 [preauth] debug3: receive packet: type 21 [preauth] debug1: SSH2_MSG_NEWKEYS received [preauth] debug2: set_newkeys: mode 0 [preauth] debug1: rekey in after 4294967296 blocks [preauth] debug1: KEX done [preauth] debug3: mm_request_send entering: type 122 [preauth] debug3: mm_request_receive_expect entering: type 123 [preauth] debug3: mm_request_receive entering [preauth] debug3: mm_request_receive entering debug3: monitor_read: checking request 122 debug3: mm_request_send entering: type 123 Connection reset by 2001:700:100:4029:a83d:8cee:2dcf:d70e port 57618 [preauth] debug1: do_cleanup [preauth] debug3: PAM: sshpam_thread_cleanup entering [preauth] debug1: monitor_read_log: child log fd closed debug3: mm_request_receive entering debug1: do_cleanup debug3: PAM: sshpam_thread_cleanup entering debug1: Killing privsep child 2432906 [root@mimi ~]# exit Script done on 2021-08-05 15:32:30+02:00
_______________________________________________ x2go-dev mailing list x2go-dev@lists.x2go.org https://lists.x2go.org/listinfo/x2go-dev