problems ssh'ing debug1: An invalid name was supplied (OSX client)

Noah admin2 at enabled.com
Sat Oct 7 08:21:57 PDT 2006


Garrett Cooper wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> Noah wrote:
>   
>> Chuck Swiger wrote:
>>     
>>> On Oct 6, 2006, at 2:26 PM, Noah wrote:
>>>       
>>>> any clues why ssh is hanging before a prompt is provided from the
>>>> server side. this prompt stalling behavior is only happening when I
>>>> am coming from my OSX ssh client. Any clues on this? I have never see
>>>> this betwe.
>>>>         
>>> Looks like your SSH keypair has been mangled:
>>>
>>> % cat ~/.ssh/id_rsa
>>> -----BEGIN RSA PRIVATE KEY-----
>>> [ ...should contain base-64 encoded data... ]
>>> -----END RSA PRIVATE KEY-----
>>>
>>> If you don't have a valid keypair there in id_rsa and id_rsa.pub, use
>>> ssh-keygen to make a new one.
>>>
>>>       
>> Hi,
>>
>> something still seems strange.  I have ~/.ssh/id_rsa and
>> ~/.ssh/id_rsa.pub files.  I am able to log in just fine to other servers
>> using the keygen information without stalling.  it is just two recently
>> built servers out of about 10 that are displaying the stalling issue.
>>
>> Here is from a server that works fine with no stall:
>>
>>
>> OpenSSH_4.2p1, OpenSSL 0.9.7i 14 Oct 2005
>> debug1: Reading configuration data /Users/username/.ssh/config
>> debug1: Applying options for hostname
>> debug1: Reading configuration data /etc/ssh_config
>> debug2: ssh_connect: needpriv 0
>> debug1: Connecting to host.domain.com [172.xx.yy.zz] port 22.
>> debug1: Connection established.
>> debug3: Not a RSA1 key file /Users/username/.ssh/id_rsa.
>> debug2: key_type_from_name: unknown key type '-----BEGIN'
>> debug3: key_read: missing keytype
>> debug3: key_read: missing whitespace
>> debug3: key_read: missing whitespace
>> debug3: key_read: missing whitespace
>> debug3: key_read: missing whitespace
>> debug3: key_read: missing whitespace
>> debug3: key_read: missing whitespace
>> debug3: key_read: missing whitespace
>> debug3: key_read: missing whitespace
>> debug3: key_read: missing whitespace
>> debug3: key_read: missing whitespace
>> debug3: key_read: missing whitespace
>> debug3: key_read: missing whitespace
>> debug3: key_read: missing whitespace
>> debug3: key_read: missing whitespace
>> debug3: key_read: missing whitespace
>> debug3: key_read: missing whitespace
>> debug3: key_read: missing whitespace
>> debug3: key_read: missing whitespace
>> debug3: key_read: missing whitespace
>> debug3: key_read: missing whitespace
>> debug3: key_read: missing whitespace
>> debug3: key_read: missing whitespace
>> debug3: key_read: missing whitespace
>> debug3: key_read: missing whitespace
>> debug3: key_read: missing whitespace
>> debug2: key_type_from_name: unknown key type '-----END'
>> debug3: key_read: missing keytype
>> debug1: identity file /Users/username/.ssh/id_rsa type 1
>> debug1: identity file /Users/username/.ssh/id_dsa type -1
>> debug1: Remote protocol version 1.99, remote software version OpenSSH_3.9p1
>> debug1: match: OpenSSH_3.9p1 pat OpenSSH_3.*
>> debug1: Enabling compatibility mode for protocol 2.0
>> debug1: Local version string SSH-2.0-OpenSSH_4.2
>> debug2: fd 3 setting O_NONBLOCK
>> debug1: Miscellaneous failure
>> No credentials cache found
>>
>> debug1: Miscellaneous failure
>> No credentials cache found
>>
>> debug1: SSH2_MSG_KEXINIT sent
>> debug1: SSH2_MSG_KEXINIT received
>> debug2: kex_parse_kexinit:
>> diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
>>
>> debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
>> debug2: kex_parse_kexinit:
>> aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc at lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
>>
>> debug2: kex_parse_kexinit:
>> aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc at lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
>>
>> debug2: kex_parse_kexinit:
>> hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
>>
>> debug2: kex_parse_kexinit:
>> hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
>>
>> debug2: kex_parse_kexinit: zlib at openssh.com,zlib,none
>> debug2: kex_parse_kexinit: zlib at openssh.com,zlib,none
>> debug2: kex_parse_kexinit:
>> debug2: kex_parse_kexinit:
>> debug2: kex_parse_kexinit: first_kex_follows 0
>> debug2: kex_parse_kexinit: reserved 0
>> debug2: kex_parse_kexinit:
>> diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
>>
>> debug2: kex_parse_kexinit: ssh-dss
>> debug2: kex_parse_kexinit:
>> aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc at lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
>>
>> debug2: kex_parse_kexinit:
>> aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc at lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
>>
>> debug2: kex_parse_kexinit:
>> hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
>>
>> debug2: kex_parse_kexinit:
>> hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
>>
>> debug2: kex_parse_kexinit: none,zlib
>> debug2: kex_parse_kexinit: none,zlib
>> debug2: kex_parse_kexinit:
>> debug2: kex_parse_kexinit:
>> debug2: kex_parse_kexinit: first_kex_follows 0
>> debug2: kex_parse_kexinit: reserved 0
>> debug2: mac_init: found hmac-md5
>> debug1: kex: server->client aes128-cbc hmac-md5 zlib
>> debug2: mac_init: found hmac-md5
>> debug1: kex: client->server aes128-cbc hmac-md5 zlib
>> debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent
>> debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
>> debug2: dh_gen_key: priv key bits set: 131/256
>> debug2: bits set: 496/1024
>> debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
>> debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
>> debug3: check_host_in_hostfile: filename /Users/username/.ssh/known_hosts
>> debug3: check_host_in_hostfile: match line 7
>> debug3: check_host_in_hostfile: filename /Users/username/.ssh/known_hosts
>> debug3: check_host_in_hostfile: match line 7
>> debug1: Host 'host.domain.com' is known and matches the DSA host key.
>> debug1: Found key in /Users/username/.ssh/known_hosts:7
>> debug2: bits set: 521/1024
>> debug1: ssh_dss_verify: signature correct
>> debug2: kex_derive_keys
>> debug2: set_newkeys: mode 1
>> debug1: Enabling compression at level 6.
>> debug1: SSH2_MSG_NEWKEYS sent
>> debug1: expecting SSH2_MSG_NEWKEYS
>> debug2: set_newkeys: mode 0
>> debug1: SSH2_MSG_NEWKEYS received
>> debug1: SSH2_MSG_SERVICE_REQUEST sent
>> debug2: service_accept: ssh-userauth
>> debug1: SSH2_MSG_SERVICE_ACCEPT received
>> debug2: key: /Users/username/.ssh/id_rsa (0x301140)
>> debug2: key: /Users/username/.ssh/id_dsa (0x0)
>> debug1: Authentications that can continue: publickey,password
>> debug3: start over, passed a different list publickey,password
>> debug3: preferred
>> gssapi-keyex,gssapi-with-mic,publickey,keyboard-interactive,password
>> debug3: authmethod_lookup publickey
>> debug3: remaining preferred: keyboard-interactive,password
>> debug3: authmethod_is_enabled publickey
>> debug1: Next authentication method: publickey
>> debug1: Offering public key: /Users/username/.ssh/id_rsa
>> debug3: send_pubkey_test
>> debug2: we sent a publickey packet, wait for reply
>> debug1: Server accepts key: pkalg ssh-rsa blen 277
>> debug2: input_userauth_pk_ok: fp
>> a6:14:91:0e:e9:91:08:3d:6e:5d:bd:40:cf:e2:af:d3
>> debug3: sign_and_send_pubkey
>> debug1: read PEM private key done: type RSA
>> debug1: Authentication succeeded (publickey).
>> debug1: channel 0: new [client-session]
>> debug3: ssh_session2_open: channel_new: 0
>> debug2: channel 0: send open
>> debug1: Entering interactive session.
>> debug2: callback start
>> debug2: client_session2_setup: id 0
>> debug2: channel 0: request pty-req confirm 0
>> debug3: tty_make_modes: ospeed 9600
>> debug3: tty_make_modes: ispeed 9600
>> debug3: tty_make_modes: 1 3
>> debug3: tty_make_modes: 2 28
>> debug3: tty_make_modes: 3 127
>> debug3: tty_make_modes: 4 21
>> debug3: tty_make_modes: 5 4
>> debug3: tty_make_modes: 6 255
>> debug3: tty_make_modes: 7 255
>> debug3: tty_make_modes: 8 17
>> debug3: tty_make_modes: 9 19
>> debug3: tty_make_modes: 10 26
>> debug3: tty_make_modes: 11 25
>> debug3: tty_make_modes: 12 18
>> debug3: tty_make_modes: 13 23
>> debug3: tty_make_modes: 14 22
>> debug3: tty_make_modes: 17 20
>> debug3: tty_make_modes: 18 15
>> debug3: tty_make_modes: 30 0
>> debug3: tty_make_modes: 31 0
>> debug3: tty_make_modes: 32 0
>> debug3: tty_make_modes: 33 0
>> debug3: tty_make_modes: 34 0
>> debug3: tty_make_modes: 35 0
>> debug3: tty_make_modes: 36 1
>> debug3: tty_make_modes: 38 1
>> debug3: tty_make_modes: 39 1
>> debug3: tty_make_modes: 40 0
>> debug3: tty_make_modes: 41 1
>> debug3: tty_make_modes: 50 1
>> debug3: tty_make_modes: 51 1
>> debug3: tty_make_modes: 53 1
>> debug3: tty_make_modes: 54 1
>> debug3: tty_make_modes: 55 0
>> debug3: tty_make_modes: 56 0
>> debug3: tty_make_modes: 57 0
>> debug3: tty_make_modes: 58 0
>> debug3: tty_make_modes: 59 1
>> debug3: tty_make_modes: 60 1
>> debug3: tty_make_modes: 61 1
>> debug3: tty_make_modes: 62 1
>> debug3: tty_make_modes: 70 1
>> debug3: tty_make_modes: 72 1
>> debug3: tty_make_modes: 73 0
>> debug3: tty_make_modes: 74 0
>> debug3: tty_make_modes: 75 0
>> debug3: tty_make_modes: 90 1
>> debug3: tty_make_modes: 91 1
>> debug3: tty_make_modes: 92 0
>> debug3: tty_make_modes: 93 0
>> debug2: channel 0: request shell confirm 0
>> debug2: fd 3 setting TCP_NODELAY
>> debug2: callback done
>> debug2: channel 0: open confirm rwindow 0 rmax 32768
>> debug2: channel 0: rcvd adjust 131072
>> Copyright (c) 1980, 1983, 1986, 1988, 1990, 1991, 1993, 1994
>>    The Regents of the University of California.  All rights reserved.
>> FreeBSD 4.10-RELEASE-p3-20041105 (hostname) #0: Wed Dec  1 09:35:10 PST
>> 2004
>>
>> Welcome to FreeBSD!
>>
>> Before seeking technical support, please use the following resources:
>>
>> o  Security advisories and updated errata information for all releases are
>>   at http://www.FreeBSD.org/releases/ - always consult the ERRATA section
>>   for your release first as it's updated frequently.
>>
>> o  The Handbook and FAQ documents are at http://www.FreeBSD.org/ and,
>>   along with the mailing lists, can be searched by going to
>>   http://www.FreeBSD.org/search/.  If the doc distribution has
>>   been installed, they're also available formatted in /usr/share/doc.
>>
>> If you still have a question or problem, please take the output of
>> `uname -a', along with any relevant error messages, and email it
>> as a question to the questions at FreeBSD.org mailing list.  If you are
>> unfamiliar with FreeBSD's directory layout, please refer to the hier(7)
>> man page.  If you are not familiar with man pages, type `man man'.
>>
>> You may also use /stand/sysinstall to re-enter the installation and
>> configuration utility.  Edit /etc/motd to change this login announcement.
>>
>> debug1: client_input_channel_req: channel 0 rtype exit-status reply 0
>> debug2: channel 0: rcvd eof
>> debug2: channel 0: output open -> drain
>> debug2: channel 0: obuf empty
>> debug2: channel 0: close_write
>> debug2: channel 0: output drain -> closed
>> debug2: channel 0: rcvd close
>> debug2: channel 0: close_read
>> debug2: channel 0: input open -> closed
>> debug3: channel 0: will not send data after close
>> debug2: channel 0: almost dead
>> debug2: channel 0: gc: notify user
>> debug2: channel 0: gc: user detached
>> debug2: channel 0: send close
>> debug2: channel 0: is dead
>> debug2: channel 0: garbage collecting
>> debug1: channel 0: free: client-session, nchannels 1
>> debug3: channel 0: status: The following connections are open:
>>  #0 client-session (t4 r0 i3/0 o3/0 fd -1/-1 cfd -1)
>>
>> debug3: channel 0: close_fds r -1 w -1 e 6 c -1
>> Connection to host.domain.com closed.
>> debug1: Transferred: stdin 0, stdout 0, stderr 43 bytes in 1.7 seconds
>> debug1: Bytes per second: stdin 0.0, stdout 0.0, stderr 25.4
>> debug1: Exit status 0
>> debug1: compress outgoing: raw data 1390, compressed 890, factor 0.64
>> debug1: compress incoming: raw data 2070, compressed 1551, factor 0.75
>>
>>
>> cheers,
>>
>> Noah
>>
>>     
>>> ---Chuck
>>>       
>
> Is UseDNS set to Yes in /etc/ssh/sshd_config?
>   

Hi,

yes - I've used 'UseDNS Yes' and UseDNS No' and restarted sshd each time 
and that didnt change anything.  also there are other clients that log 
into the FreeBSD (sshd side) box fine without slowing down.  that is why 
I am wondering if it something more on the client end.  But then to 
repeat the OSX client side logs into other sshd servers without lag.

it is something specific to my OSX (ssh client)  machine and the FreeBSD 
box (sshd side)

any other clues?

Cheers,

Noah

> - -Garrett
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.5 (GNU/Linux)
> Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
>
> iD8DBQFFJ0jn6CkrZkzMC68RAuadAKCBWMSzA2uL8w7+TFpzyOVxBSV0FwCfeEOR
> 3+PxGKEKIp7HnDaIAgcqung=
> =37L6
> -----END PGP SIGNATURE-----
> _______________________________________________
> freebsd-questions at freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-questions
> To unsubscribe, send any mail to "freebsd-questions-unsubscribe at freebsd.org"
>   



More information about the freebsd-questions mailing list