Discussion:
Test Failure OpenSSH 7.1 P2 on HPE NSE for integrity
(too old to reply)
Randall S. Becker
2016-02-09 23:41:40 UTC
Permalink
Thread split from my previous communication. Here is the integrity logs on
the platform. I had to cut this should due to the length of the logs (5Mb).



***************** failed-regress.log ************



trace: test integrity: hmac-sha1 @2900

FAIL: unexpected error mac hmac-sha1 at 2900: Bytes per second: sent
65665.7, received 55994.0.



trace: test integrity: hmac-sha1 @2901

FAIL: unexpected error mac hmac-sha1 at 2901: Bytes per second: sent
36686.1, received 31282.7.



trace: test integrity: hmac-sha1 @2902

FAIL: unexpected error mac hmac-sha1 at 2902: Bytes per second: sent
33328.0, received 28419.2.



trace: test integrity: hmac-sha1 @2903

FAIL: unexpected error mac hmac-sha1 at 2903: Bytes per second: sent
49762.6, received 42433.2.



trace: test integrity: hmac-sha1 @2904

FAIL: unexpected error mac hmac-sha1 at 2904: Bytes per second: sent
54187.5, received 46206.4.



trace: test integrity: hmac-sha1 @2905

FATAL:



trace: test integrity: hmac-sha1 @2905

FATAL:

FAIL:

<<BREAK HIT>>



***************** failed-ssh.log ************



trace: test integrity: hmac-sha1 @2900

debug1: Executing proxy command: exec sh
/home/git/openssh-portable/regress/sshd-log-wrapper.sh
/home/git/openssh-portable/regress/sshd.log /home/git/openssh-portable/sshd
-i -f /home/git/openssh-portable/regress/sshd_proxy |
/home/git/openssh-portable/regress/modpipe -wm xor:2900:1

debug1: permanently_drop_suid: 65535

debug1: identity file /home/git/openssh-portable/regress/rsa type 1

debug1: key_load_public: No such file or directory

debug1: identity file /home/git/openssh-portable/regress/rsa-cert type -1

debug1: identity file /home/git/openssh-portable/regress/ed25519 type 4

debug1: key_load_public: No such file or directory

debug1: identity file /home/git/openssh-portable/regress/ed25519-cert type
-1

debug1: Enabling compatibility mode for protocol 2.0

debug1: Local version string SSH-2.0-OpenSSH_7.1

debug1: Remote protocol version 2.0, remote software version OpenSSH_7.1

debug1: match: OpenSSH_7.1 pat OpenSSH* compat 0x04000000

debug2: fd 6 setting O_NONBLOCK

debug2: fd 5 setting O_NONBLOCK

debug1: Authenticating to 127.0.0.1:4242 as 'SUPER.SUPER'

debug1: using hostkeyalias: localhost-with-alias

debug3: hostkeys_foreach: reading file
"/home/git/openssh-portable/regress/known_hosts"

debug3: record_hostkey: found key type RSA in file
/home/git/openssh-portable/regress/known_hosts:1

debug3: record_hostkey: found key type ED25519 in file
/home/git/openssh-portable/regress/known_hosts:2

debug3: load_hostkeys: loaded 2 keys from localhost-with-alias

debug3: hostkeys_foreach: reading file
"/home/git/openssh-portable/regress/known_hosts"

debug3: record_hostkey: found key type RSA in file
/home/git/openssh-portable/regress/known_hosts:1

debug3: record_hostkey: found key type ED25519 in file
/home/git/openssh-portable/regress/known_hosts:2

debug3: load_hostkeys: loaded 2 keys from localhost-with-alias

debug3: order_hostkeyalgs: prefer hostkeyalgs:
ssh-ed25519-cert-***@openssh.com,ssh-rsa-cert-***@openssh.com,ssh-ed25519,ss
h-rsa

debug1: SSH2_MSG_KEXINIT sent

debug1: SSH2_MSG_KEXINIT received

debug2: kex_parse_kexinit:
diffie-hellman-group14-sha1,diffie-hellman-group1-sha1

debug2: kex_parse_kexinit:
ssh-ed25519-cert-***@openssh.com,ssh-rsa-cert-***@openssh.com,ssh-ed25519,ss
h-rsa,ecdsa-sha2-nistp256-cert-***@openssh.com,ecdsa-sha2-nistp384-cert-v01@
openssh.com,ecdsa-sha2-nistp521-cert-***@openssh.com,ecdsa-sha2-nistp256,ecd
sa-sha2-nistp384,ecdsa-sha2-nistp521

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: none,***@openssh.com,zlib

debug2: kex_parse_kexinit: none,***@openssh.com,zlib

debug2: kex_parse_kexinit:

debug2: kex_parse_kexinit:

debug2: first_kex_follows 0

debug2: reserved 0

debug2: kex_parse_kexinit:
curve25519-***@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2
-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1

debug2: kex_parse_kexinit: ssh-rsa,ssh-ed25519

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: none,***@openssh.com

debug2: kex_parse_kexinit: none,***@openssh.com

debug2: kex_parse_kexinit:

debug2: kex_parse_kexinit:

debug2: first_kex_follows 0

debug2: reserved 0

debug1: kex: server->client aes128-ctr hmac-sha1 none

debug1: kex: client->server aes128-ctr hmac-sha1 none

debug1: sending SSH2_MSG_KEXDH_INIT

debug2: bits set: 1001/2048

debug1: expecting SSH2_MSG_KEXDH_REPLY

debug1: Server host key: ssh-ed25519
SHA256:lxDml05WuoE61IZePHCwjGYK3aZfa8URdyghBnnBMlA

debug1: using hostkeyalias: localhost-with-alias

debug3: hostkeys_foreach: reading file
"/home/git/openssh-portable/regress/known_hosts"

debug3: record_hostkey: found key type RSA in file
/home/git/openssh-portable/regress/known_hosts:1

debug3: record_hostkey: found key type ED25519 in file
/home/git/openssh-portable/regress/known_hosts:2

debug3: load_hostkeys: loaded 2 keys from localhost-with-alias

debug3: hostkeys_foreach: reading file
"/home/git/openssh-portable/regress/known_hosts"

debug3: record_hostkey: found key type RSA in file
/home/git/openssh-portable/regress/known_hosts:1

debug3: record_hostkey: found key type ED25519 in file
/home/git/openssh-portable/regress/known_hosts:2

debug3: load_hostkeys: loaded 2 keys from localhost-with-alias

debug1: Host 'localhost-with-alias' is known and matches the ED25519 host
key.

debug1: Found key in /home/git/openssh-portable/regress/known_hosts:2

debug2: bits set: 1053/2048

debug2: set_newkeys: mode 1

debug1: SSH2_MSG_NEWKEYS sent

debug1: expecting SSH2_MSG_NEWKEYS

debug2: set_newkeys: mode 0

debug1: SSH2_MSG_NEWKEYS received

debug1: SSH2_MSG_SERVICE_REQUEST sent

debug2: service_accept: ssh-userauth

debug1: SSH2_MSG_SERVICE_ACCEPT received

debug2: key: /home/git/openssh-portable/regress/rsa (8023bd0), explicit

debug2: key: /home/git/openssh-portable/regress/ed25519 (80235c0), explicit

debug1: Authentications that can continue:
publickey,password,keyboard-interactive

debug3: start over, passed a different list
publickey,password,keyboard-interactive

debug3: preferred publickey

debug3: authmethod_lookup publickey

debug3: remaining preferred:

debug3: authmethod_is_enabled publickey

debug1: Next authentication method: publickey

debug1: Offering RSA public key: /home/git/openssh-portable/regress/rsa

debug3: send_pubkey_test

debug2: we sent a publickey packet, wait for reply

debug1: Server accepts key: pkalg ssh-rsa blen 279

debug2: input_userauth_pk_ok: fp
SHA256:MhINGDV8/uc+x3B2JvlET1kfV3ZBdQqFlTca3CE7wNM

debug3: sign_and_send_pubkey: RSA
SHA256:MhINGDV8/uc+x3B2JvlET1kfV3ZBdQqFlTca3CE7wNM

debug1: Authentication succeeded (publickey).

Authenticated to 127.0.0.1 (via proxy).

debug2: fd 7 setting O_NONBLOCK

debug1: channel 0: new [client-session]

debug3: ssh_session2_open: channel_new: 0

debug2: channel 0: send open

debug1: Requesting no-more-***@openssh.com

debug1: Entering interactive session.

debug1: client_input_global_request: rtype hostkeys-***@openssh.com
want_reply 0

debug2: callback start

debug2: client_session2_setup: id 0

debug1: Sending command: printf "%4096s" " "

debug2: channel 0: request exec confirm 1

debug2: callback done

debug2: channel 0: open confirm rwindow 0 rmax 32768

debug2: channel 0: rcvd adjust 2097152

debug2: channel_input_status_confirm: type 99 id 0

debug2: exec request accepted on channel 0

debug2: channel 0: rcvd eof

debug2: channel 0: output open -> drain

debug2: channel 0: obuf empty

debug2: channel 0: close_write

debug2: channel 0: output drain -> closed

debug1: client_input_channel_req: channel 0 rtype exit-signal reply 0

debug1: client_input_channel_req: channel 0 rtype ***@openssh.com reply 0

debug2: channel 0: rcvd eow

debug2: channel 0: close_read

debug2: channel 0: input open -> closed

debug2: channel 0: rcvd close

debug3: channel 0: will not send data after close

debug2: channel 0: almost dead

debug2: channel 0: gc: notify user

debug2: channel 0: gc: user detached

debug2: channel 0: send close

debug2: channel 0: is dead

debug2: channel 0: garbage collecting

debug1: channel 0: free: client-session, nchannels 1

debug3: channel 0: status: The following connections are open:

#0 client-session (t4 r0 i3/0 o3/0 fd -1/-1 cc -1)



debug1: fd 1 clearing O_NONBLOCK

Transferred: sent 2064, received 1760 bytes, in 0.0 seconds

Bytes per second: sent 65665.7, received 55994.0

debug1: Exit status -1

FAIL: unexpected error mac hmac-sha1 at 2900: Bytes per second: sent
65665.7, received 55994.0.



trace: test integrity: hmac-sha1 @2901

debug1: Executing proxy command: exec sh
/home/git/openssh-portable/regress/sshd-log-wrapper.sh
/home/git/openssh-portable/regress/sshd.log /home/git/openssh-portable/sshd
-i -f /home/git/openssh-portable/regress/sshd_proxy |
/home/git/openssh-portable/regress/modpipe -wm xor:2901:1

debug1: permanently_drop_suid: 65535

debug1: identity file /home/git/openssh-portable/regress/rsa type 1

debug1: key_load_public: No such file or directory

debug1: identity file /home/git/openssh-portable/regress/rsa-cert type -1

debug1: identity file /home/git/openssh-portable/regress/ed25519 type 4

debug1: key_load_public: No such file or directory

debug1: identity file /home/git/openssh-portable/regress/ed25519-cert type
-1

debug1: Enabling compatibility mode for protocol 2.0

debug1: Local version string SSH-2.0-OpenSSH_7.1

debug1: Remote protocol version 2.0, remote software version OpenSSH_7.1

debug1: match: OpenSSH_7.1 pat OpenSSH* compat 0x04000000

debug2: fd 6 setting O_NONBLOCK

debug2: fd 5 setting O_NONBLOCK

debug1: Authenticating to 127.0.0.1:4242 as 'SUPER.SUPER'

debug1: using hostkeyalias: localhost-with-alias

debug3: hostkeys_foreach: reading file
"/home/git/openssh-portable/regress/known_hosts"

debug3: record_hostkey: found key type RSA in file
/home/git/openssh-portable/regress/known_hosts:1

debug3: record_hostkey: found key type ED25519 in file
/home/git/openssh-portable/regress/known_hosts:2

debug3: load_hostkeys: loaded 2 keys from localhost-with-alias

debug3: hostkeys_foreach: reading file
"/home/git/openssh-portable/regress/known_hosts"

debug3: record_hostkey: found key type RSA in file
/home/git/openssh-portable/regress/known_hosts:1

debug3: record_hostkey: found key type ED25519 in file
/home/git/openssh-portable/regress/known_hosts:2

debug3: load_hostkeys: loaded 2 keys from localhost-with-alias

debug3: order_hostkeyalgs: prefer hostkeyalgs:
ssh-ed25519-cert-***@openssh.com,ssh-rsa-cert-***@openssh.com,ssh-ed25519,ss
h-rsa

debug1: SSH2_MSG_KEXINIT sent

debug1: SSH2_MSG_KEXINIT received

debug2: kex_parse_kexinit:
diffie-hellman-group14-sha1,diffie-hellman-group1-sha1

debug2: kex_parse_kexinit:
ssh-ed25519-cert-***@openssh.com,ssh-rsa-cert-***@openssh.com,ssh-ed25519,ss
h-rsa,ecdsa-sha2-nistp256-cert-***@openssh.com,ecdsa-sha2-nistp384-cert-v01@
openssh.com,ecdsa-sha2-nistp521-cert-***@openssh.com,ecdsa-sha2-nistp256,ecd
sa-sha2-nistp384,ecdsa-sha2-nistp521

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: none,***@openssh.com,zlib

debug2: kex_parse_kexinit: none,***@openssh.com,zlib

debug2: kex_parse_kexinit:

debug2: kex_parse_kexinit:

debug2: first_kex_follows 0

debug2: reserved 0

debug2: kex_parse_kexinit:
curve25519-***@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2
-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1

debug2: kex_parse_kexinit: ssh-rsa,ssh-ed25519

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: none,***@openssh.com

debug2: kex_parse_kexinit: none,***@openssh.com

debug2: kex_parse_kexinit:

debug2: kex_parse_kexinit:

debug2: first_kex_follows 0

debug2: reserved 0

debug1: kex: server->client aes128-ctr hmac-sha1 none

debug1: kex: client->server aes128-ctr hmac-sha1 none

debug1: sending SSH2_MSG_KEXDH_INIT

debug2: bits set: 1027/2048

debug1: expecting SSH2_MSG_KEXDH_REPLY

debug1: Server host key: ssh-ed25519
SHA256:lxDml05WuoE61IZePHCwjGYK3aZfa8URdyghBnnBMlA

debug1: using hostkeyalias: localhost-with-alias

debug3: hostkeys_foreach: reading file
"/home/git/openssh-portable/regress/known_hosts"

debug3: record_hostkey: found key type RSA in file
/home/git/openssh-portable/regress/known_hosts:1

debug3: record_hostkey: found key type ED25519 in file
/home/git/openssh-portable/regress/known_hosts:2

debug3: load_hostkeys: loaded 2 keys from localhost-with-alias

debug3: hostkeys_foreach: reading file
"/home/git/openssh-portable/regress/known_hosts"

debug3: record_hostkey: found key type RSA in file
/home/git/openssh-portable/regress/known_hosts:1

debug3: record_hostkey: found key type ED25519 in file
/home/git/openssh-portable/regress/known_hosts:2

debug3: load_hostkeys: loaded 2 keys from localhost-with-alias

debug1: Host 'localhost-with-alias' is known and matches the ED25519 host
key.

debug1: Found key in /home/git/openssh-portable/regress/known_hosts:2

debug2: bits set: 1014/2048

debug2: set_newkeys: mode 1

debug1: SSH2_MSG_NEWKEYS sent

debug1: expecting SSH2_MSG_NEWKEYS

debug2: set_newkeys: mode 0

debug1: SSH2_MSG_NEWKEYS received

debug1: SSH2_MSG_SERVICE_REQUEST sent

debug2: service_accept: ssh-userauth

debug1: SSH2_MSG_SERVICE_ACCEPT received

debug2: key: /home/git/openssh-portable/regress/rsa (8023bd0), explicit

debug2: key: /home/git/openssh-portable/regress/ed25519 (80235c0), explicit

debug1: Authentications that can continue:
publickey,password,keyboard-interactive

debug3: start over, passed a different list
publickey,password,keyboard-interactive

debug3: preferred publickey

debug3: authmethod_lookup publickey

debug3: remaining preferred:

debug3: authmethod_is_enabled publickey

debug1: Next authentication method: publickey

debug1: Offering RSA public key: /home/git/openssh-portable/regress/rsa

debug3: send_pubkey_test

debug2: we sent a publickey packet, wait for reply

debug1: Server accepts key: pkalg ssh-rsa blen 279

debug2: input_userauth_pk_ok: fp
SHA256:MhINGDV8/uc+x3B2JvlET1kfV3ZBdQqFlTca3CE7wNM

debug3: sign_and_send_pubkey: RSA
SHA256:MhINGDV8/uc+x3B2JvlET1kfV3ZBdQqFlTca3CE7wNM

debug1: Authentication succeeded (publickey).

Authenticated to 127.0.0.1 (via proxy).

debug2: fd 7 setting O_NONBLOCK

debug1: channel 0: new [client-session]

debug3: ssh_session2_open: channel_new: 0

debug2: channel 0: send open

debug1: Requesting no-more-***@openssh.com

debug1: Entering interactive session.

debug1: client_input_global_request: rtype hostkeys-***@openssh.com
want_reply 0

debug2: callback start

debug2: client_session2_setup: id 0

debug1: Sending command: printf "%4096s" " "

debug2: channel 0: request exec confirm 1

debug2: callback done

debug2: channel 0: open confirm rwindow 0 rmax 32768

debug2: channel 0: rcvd adjust 2097152

debug2: channel_input_status_confirm: type 99 id 0

debug2: exec request accepted on channel 0

debug2: channel 0: rcvd eof

debug2: channel 0: output open -> drain

debug2: channel 0: obuf empty

debug2: channel 0: close_write

debug2: channel 0: output drain -> closed

debug1: client_input_channel_req: channel 0 rtype exit-signal reply 0

debug1: client_input_channel_req: channel 0 rtype ***@openssh.com reply 0

debug2: channel 0: rcvd eow

debug2: channel 0: close_read

debug2: channel 0: input open -> closed

debug2: channel 0: rcvd close

debug3: channel 0: will not send data after close

debug2: channel 0: almost dead

debug2: channel 0: gc: notify user

debug2: channel 0: gc: user detached

debug2: channel 0: send close

debug2: channel 0: is dead

debug2: channel 0: garbage collecting

debug1: channel 0: free: client-session, nchannels 1

debug3: channel 0: status: The following connections are open:

#0 client-session (t4 r0 i3/0 o3/0 fd -1/-1 cc -1)



debug1: fd 1 clearing O_NONBLOCK

Transferred: sent 2064, received 1760 bytes, in 0.1 seconds

Bytes per second: sent 36686.1, received 31282.7

debug1: Exit status -1

FAIL: unexpected error mac hmac-sha1 at 2901: Bytes per second: sent
36686.1, received 31282.7.



trace: test integrity: hmac-sha1 @2902

debug1: Executing proxy command: exec sh
/home/git/openssh-portable/regress/sshd-log-wrapper.sh
/home/git/openssh-portable/regress/sshd.log /home/git/openssh-portable/sshd
-i -f /home/git/openssh-portable/regress/sshd_proxy |
/home/git/openssh-portable/regress/modpipe -wm xor:2902:1

debug1: permanently_drop_suid: 65535

debug1: identity file /home/git/openssh-portable/regress/rsa type 1

debug1: key_load_public: No such file or directory

debug1: identity file /home/git/openssh-portable/regress/rsa-cert type -1

debug1: identity file /home/git/openssh-portable/regress/ed25519 type 4

debug1: key_load_public: No such file or directory

debug1: identity file /home/git/openssh-portable/regress/ed25519-cert type
-1

debug1: Enabling compatibility mode for protocol 2.0

debug1: Local version string SSH-2.0-OpenSSH_7.1

debug1: Remote protocol version 2.0, remote software version OpenSSH_7.1

debug1: match: OpenSSH_7.1 pat OpenSSH* compat 0x04000000

debug2: fd 6 setting O_NONBLOCK

debug2: fd 5 setting O_NONBLOCK

debug1: Authenticating to 127.0.0.1:4242 as 'SUPER.SUPER'

debug1: using hostkeyalias: localhost-with-alias

debug3: hostkeys_foreach: reading file
"/home/git/openssh-portable/regress/known_hosts"

debug3: record_hostkey: found key type RSA in file
/home/git/openssh-portable/regress/known_hosts:1

debug3: record_hostkey: found key type ED25519 in file
/home/git/openssh-portable/regress/known_hosts:2

debug3: load_hostkeys: loaded 2 keys from localhost-with-alias

debug3: hostkeys_foreach: reading file
"/home/git/openssh-portable/regress/known_hosts"

debug3: record_hostkey: found key type RSA in file
/home/git/openssh-portable/regress/known_hosts:1

debug3: record_hostkey: found key type ED25519 in file
/home/git/openssh-portable/regress/known_hosts:2

debug3: load_hostkeys: loaded 2 keys from localhost-with-alias

debug3: order_hostkeyalgs: prefer hostkeyalgs:
ssh-ed25519-cert-***@openssh.com,ssh-rsa-cert-***@openssh.com,ssh-ed25519,ss
h-rsa

debug1: SSH2_MSG_KEXINIT sent

debug1: SSH2_MSG_KEXINIT received

debug2: kex_parse_kexinit:
diffie-hellman-group14-sha1,diffie-hellman-group1-sha1

debug2: kex_parse_kexinit:
ssh-ed25519-cert-***@openssh.com,ssh-rsa-cert-***@openssh.com,ssh-ed25519,ss
h-rsa,ecdsa-sha2-nistp256-cert-***@openssh.com,ecdsa-sha2-nistp384-cert-v01@
openssh.com,ecdsa-sha2-nistp521-cert-***@openssh.com,ecdsa-sha2-nistp256,ecd
sa-sha2-nistp384,ecdsa-sha2-nistp521

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: none,***@openssh.com,zlib

debug2: kex_parse_kexinit: none,***@openssh.com,zlib

debug2: kex_parse_kexinit:

debug2: kex_parse_kexinit:

debug2: first_kex_follows 0

debug2: reserved 0

debug2: kex_parse_kexinit:
curve25519-***@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2
-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1

debug2: kex_parse_kexinit: ssh-rsa,ssh-ed25519

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: none,***@openssh.com

debug2: kex_parse_kexinit: none,***@openssh.com

debug2: kex_parse_kexinit:

debug2: kex_parse_kexinit:

debug2: first_kex_follows 0

debug2: reserved 0

debug1: kex: server->client aes128-ctr hmac-sha1 none

debug1: kex: client->server aes128-ctr hmac-sha1 none

debug1: sending SSH2_MSG_KEXDH_INIT

debug2: bits set: 984/2048

debug1: expecting SSH2_MSG_KEXDH_REPLY

debug1: Server host key: ssh-ed25519
SHA256:lxDml05WuoE61IZePHCwjGYK3aZfa8URdyghBnnBMlA

debug1: using hostkeyalias: localhost-with-alias

debug3: hostkeys_foreach: reading file
"/home/git/openssh-portable/regress/known_hosts"

debug3: record_hostkey: found key type RSA in file
/home/git/openssh-portable/regress/known_hosts:1

debug3: record_hostkey: found key type ED25519 in file
/home/git/openssh-portable/regress/known_hosts:2

debug3: load_hostkeys: loaded 2 keys from localhost-with-alias

debug3: hostkeys_foreach: reading file
"/home/git/openssh-portable/regress/known_hosts"

debug3: record_hostkey: found key type RSA in file
/home/git/openssh-portable/regress/known_hosts:1

debug3: record_hostkey: found key type ED25519 in file
/home/git/openssh-portable/regress/known_hosts:2

debug3: load_hostkeys: loaded 2 keys from localhost-with-alias

debug1: Host 'localhost-with-alias' is known and matches the ED25519 host
key.

debug1: Found key in /home/git/openssh-portable/regress/known_hosts:2

debug2: bits set: 1015/2048

debug2: set_newkeys: mode 1

debug1: SSH2_MSG_NEWKEYS sent

debug1: expecting SSH2_MSG_NEWKEYS

debug2: set_newkeys: mode 0

debug1: SSH2_MSG_NEWKEYS received

debug1: SSH2_MSG_SERVICE_REQUEST sent

debug2: service_accept: ssh-userauth

debug1: SSH2_MSG_SERVICE_ACCEPT received

debug2: key: /home/git/openssh-portable/regress/rsa (8023bd0), explicit

debug2: key: /home/git/openssh-portable/regress/ed25519 (80235c0), explicit

debug1: Authentications that can continue:
publickey,password,keyboard-interactive

debug3: start over, passed a different list
publickey,password,keyboard-interactive

debug3: preferred publickey

debug3: authmethod_lookup publickey

debug3: remaining preferred:

debug3: authmethod_is_enabled publickey

debug1: Next authentication method: publickey

debug1: Offering RSA public key: /home/git/openssh-portable/regress/rsa

debug3: send_pubkey_test

debug2: we sent a publickey packet, wait for reply

debug1: Server accepts key: pkalg ssh-rsa blen 279

debug2: input_userauth_pk_ok: fp
SHA256:MhINGDV8/uc+x3B2JvlET1kfV3ZBdQqFlTca3CE7wNM

debug3: sign_and_send_pubkey: RSA
SHA256:MhINGDV8/uc+x3B2JvlET1kfV3ZBdQqFlTca3CE7wNM

debug1: Authentication succeeded (publickey).

Authenticated to 127.0.0.1 (via proxy).

debug2: fd 7 setting O_NONBLOCK

debug1: channel 0: new [client-session]

debug3: ssh_session2_open: channel_new: 0

debug2: channel 0: send open

debug1: Requesting no-more-***@openssh.com

debug1: Entering interactive session.

debug1: client_input_global_request: rtype hostkeys-***@openssh.com
want_reply 0

debug2: callback start

debug2: client_session2_setup: id 0

debug1: Sending command: printf "%4096s" " "

debug2: channel 0: request exec confirm 1

debug2: callback done

debug2: channel 0: open confirm rwindow 0 rmax 32768

debug2: channel 0: rcvd adjust 2097152

debug2: channel_input_status_confirm: type 99 id 0

debug2: exec request accepted on channel 0

debug2: channel 0: rcvd eof

debug2: channel 0: output open -> drain

debug2: channel 0: obuf empty

debug2: channel 0: close_write

debug2: channel 0: output drain -> closed

debug1: client_input_channel_req: channel 0 rtype exit-signal reply 0

debug1: client_input_channel_req: channel 0 rtype ***@openssh.com reply 0

debug2: channel 0: rcvd eow

debug2: channel 0: close_read

debug2: channel 0: input open -> closed

debug2: channel 0: rcvd close

debug3: channel 0: will not send data after close

debug2: channel 0: almost dead

debug2: channel 0: gc: notify user

debug2: channel 0: gc: user detached

debug2: channel 0: send close

debug2: channel 0: is dead

debug2: channel 0: garbage collecting

debug1: channel 0: free: client-session, nchannels 1

debug3: channel 0: status: The following connections are open:

#0 client-session (t4 r0 i3/0 o3/0 fd -1/-1 cc -1)



debug1: fd 1 clearing O_NONBLOCK

Transferred: sent 2064, received 1760 bytes, in 0.1 seconds

Bytes per second: sent 33328.0, received 28419.2

debug1: Exit status -1

FAIL: unexpected error mac hmac-sha1 at 2902: Bytes per second: sent
33328.0, received 28419.2.



trace: test integrity: hmac-sha1 @2903

debug1: Executing proxy command: exec sh
/home/git/openssh-portable/regress/sshd-log-wrapper.sh
/home/git/openssh-portable/regress/sshd.log /home/git/openssh-portable/sshd
-i -f /home/git/openssh-portable/regress/sshd_proxy |
/home/git/openssh-portable/regress/modpipe -wm xor:2903:1

debug1: permanently_drop_suid: 65535

debug1: identity file /home/git/openssh-portable/regress/rsa type 1

debug1: key_load_public: No such file or directory

debug1: identity file /home/git/openssh-portable/regress/rsa-cert type -1

debug1: identity file /home/git/openssh-portable/regress/ed25519 type 4

debug1: key_load_public: No such file or directory

debug1: identity file /home/git/openssh-portable/regress/ed25519-cert type
-1

debug1: Enabling compatibility mode for protocol 2.0

debug1: Local version string SSH-2.0-OpenSSH_7.1

debug1: Remote protocol version 2.0, remote software version OpenSSH_7.1

debug1: match: OpenSSH_7.1 pat OpenSSH* compat 0x04000000

debug2: fd 6 setting O_NONBLOCK

debug2: fd 5 setting O_NONBLOCK

debug1: Authenticating to 127.0.0.1:4242 as 'SUPER.SUPER'

debug1: using hostkeyalias: localhost-with-alias

debug3: hostkeys_foreach: reading file
"/home/git/openssh-portable/regress/known_hosts"

debug3: record_hostkey: found key type RSA in file
/home/git/openssh-portable/regress/known_hosts:1

debug3: record_hostkey: found key type ED25519 in file
/home/git/openssh-portable/regress/known_hosts:2

debug3: load_hostkeys: loaded 2 keys from localhost-with-alias

debug3: hostkeys_foreach: reading file
"/home/git/openssh-portable/regress/known_hosts"

debug3: record_hostkey: found key type RSA in file
/home/git/openssh-portable/regress/known_hosts:1

debug3: record_hostkey: found key type ED25519 in file
/home/git/openssh-portable/regress/known_hosts:2

debug3: load_hostkeys: loaded 2 keys from localhost-with-alias

debug3: order_hostkeyalgs: prefer hostkeyalgs:
ssh-ed25519-cert-***@openssh.com,ssh-rsa-cert-***@openssh.com,ssh-ed25519,ss
h-rsa

debug1: SSH2_MSG_KEXINIT sent

debug1: SSH2_MSG_KEXINIT received

debug2: kex_parse_kexinit:
diffie-hellman-group14-sha1,diffie-hellman-group1-sha1

debug2: kex_parse_kexinit:
ssh-ed25519-cert-***@openssh.com,ssh-rsa-cert-***@openssh.com,ssh-ed25519,ss
h-rsa,ecdsa-sha2-nistp256-cert-***@openssh.com,ecdsa-sha2-nistp384-cert-v01@
openssh.com,ecdsa-sha2-nistp521-cert-***@openssh.com,ecdsa-sha2-nistp256,ecd
sa-sha2-nistp384,ecdsa-sha2-nistp521

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: none,***@openssh.com,zlib

debug2: kex_parse_kexinit: none,***@openssh.com,zlib

debug2: kex_parse_kexinit:

debug2: kex_parse_kexinit:

debug2: first_kex_follows 0

debug2: reserved 0

debug2: kex_parse_kexinit:
curve25519-***@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2
-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1

debug2: kex_parse_kexinit: ssh-rsa,ssh-ed25519

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: none,***@openssh.com

debug2: kex_parse_kexinit: none,***@openssh.com

debug2: kex_parse_kexinit:

debug2: kex_parse_kexinit:

debug2: first_kex_follows 0

debug2: reserved 0

debug1: kex: server->client aes128-ctr hmac-sha1 none

debug1: kex: client->server aes128-ctr hmac-sha1 none

debug1: sending SSH2_MSG_KEXDH_INIT

debug2: bits set: 1010/2048

debug1: expecting SSH2_MSG_KEXDH_REPLY

debug1: Server host key: ssh-ed25519
SHA256:lxDml05WuoE61IZePHCwjGYK3aZfa8URdyghBnnBMlA

debug1: using hostkeyalias: localhost-with-alias

debug3: hostkeys_foreach: reading file
"/home/git/openssh-portable/regress/known_hosts"

debug3: record_hostkey: found key type RSA in file
/home/git/openssh-portable/regress/known_hosts:1

debug3: record_hostkey: found key type ED25519 in file
/home/git/openssh-portable/regress/known_hosts:2

debug3: load_hostkeys: loaded 2 keys from localhost-with-alias

debug3: hostkeys_foreach: reading file
"/home/git/openssh-portable/regress/known_hosts"

debug3: record_hostkey: found key type RSA in file
/home/git/openssh-portable/regress/known_hosts:1

debug3: record_hostkey: found key type ED25519 in file
/home/git/openssh-portable/regress/known_hosts:2

debug3: load_hostkeys: loaded 2 keys from localhost-with-alias

debug1: Host 'localhost-with-alias' is known and matches the ED25519 host
key.

debug1: Found key in /home/git/openssh-portable/regress/known_hosts:2

debug2: bits set: 993/2048

debug2: set_newkeys: mode 1

debug1: SSH2_MSG_NEWKEYS sent

debug1: expecting SSH2_MSG_NEWKEYS

debug2: set_newkeys: mode 0

debug1: SSH2_MSG_NEWKEYS received

debug1: SSH2_MSG_SERVICE_REQUEST sent

debug2: service_accept: ssh-userauth

debug1: SSH2_MSG_SERVICE_ACCEPT received

debug2: key: /home/git/openssh-portable/regress/rsa (8023bd0), explicit

debug2: key: /home/git/openssh-portable/regress/ed25519 (80235c0), explicit

debug1: Authentications that can continue:
publickey,password,keyboard-interactive

debug3: start over, passed a different list
publickey,password,keyboard-interactive

debug3: preferred publickey

debug3: authmethod_lookup publickey

debug3: remaining preferred:

debug3: authmethod_is_enabled publickey

debug1: Next authentication method: publickey

debug1: Offering RSA public key: /home/git/openssh-portable/regress/rsa

debug3: send_pubkey_test

debug2: we sent a publickey packet, wait for reply

debug1: Server accepts key: pkalg ssh-rsa blen 279

debug2: input_userauth_pk_ok: fp
SHA256:MhINGDV8/uc+x3B2JvlET1kfV3ZBdQqFlTca3CE7wNM

debug3: sign_and_send_pubkey: RSA
SHA256:MhINGDV8/uc+x3B2JvlET1kfV3ZBdQqFlTca3CE7wNM

debug1: Authentication succeeded (publickey).

Authenticated to 127.0.0.1 (via proxy).

debug2: fd 7 setting O_NONBLOCK

debug1: channel 0: new [client-session]

debug3: ssh_session2_open: channel_new: 0

debug2: channel 0: send open

debug1: Requesting no-more-***@openssh.com

debug1: Entering interactive session.

debug1: client_input_global_request: rtype hostkeys-***@openssh.com
want_reply 0

debug2: callback start

debug2: client_session2_setup: id 0

debug1: Sending command: printf "%4096s" " "

debug2: channel 0: request exec confirm 1

debug2: callback done

debug2: channel 0: open confirm rwindow 0 rmax 32768

debug2: channel 0: rcvd adjust 2097152

debug2: channel_input_status_confirm: type 99 id 0

debug2: exec request accepted on channel 0

debug2: channel 0: rcvd eof

debug2: channel 0: output open -> drain

debug2: channel 0: obuf empty

debug2: channel 0: close_write

debug2: channel 0: output drain -> closed

debug1: client_input_channel_req: channel 0 rtype exit-signal reply 0

debug1: client_input_channel_req: channel 0 rtype ***@openssh.com reply 0

debug2: channel 0: rcvd eow

debug2: channel 0: close_read

debug2: channel 0: input open -> closed

debug2: channel 0: rcvd close

debug3: channel 0: will not send data after close

debug2: channel 0: almost dead

debug2: channel 0: gc: notify user

debug2: channel 0: gc: user detached

debug2: channel 0: send close

debug2: channel 0: is dead

debug2: channel 0: garbage collecting

debug1: channel 0: free: client-session, nchannels 1

debug3: channel 0: status: The following connections are open:

#0 client-session (t4 r0 i3/0 o3/0 fd -1/-1 cc -1)



debug1: fd 1 clearing O_NONBLOCK

Transferred: sent 2064, received 1760 bytes, in 0.0 seconds

Bytes per second: sent 49762.6, received 42433.2

debug1: Exit status -1

FAIL: unexpected error mac hmac-sha1 at 2903: Bytes per second: sent
49762.6, received 42433.2.



trace: test integrity: hmac-sha1 @2904

debug1: Executing proxy command: exec sh
/home/git/openssh-portable/regress/sshd-log-wrapper.sh
/home/git/openssh-portable/regress/sshd.log /home/git/openssh-portable/sshd
-i -f /home/git/openssh-portable/regress/sshd_proxy |
/home/git/openssh-portable/regress/modpipe -wm xor:2904:1

debug1: permanently_drop_suid: 65535

debug1: identity file /home/git/openssh-portable/regress/rsa type 1

debug1: key_load_public: No such file or directory

debug1: identity file /home/git/openssh-portable/regress/rsa-cert type -1

debug1: identity file /home/git/openssh-portable/regress/ed25519 type 4

debug1: key_load_public: No such file or directory

debug1: identity file /home/git/openssh-portable/regress/ed25519-cert type
-1

debug1: Enabling compatibility mode for protocol 2.0

debug1: Local version string SSH-2.0-OpenSSH_7.1

debug1: Remote protocol version 2.0, remote software version OpenSSH_7.1

debug1: match: OpenSSH_7.1 pat OpenSSH* compat 0x04000000

debug2: fd 6 setting O_NONBLOCK

debug2: fd 5 setting O_NONBLOCK

debug1: Authenticating to 127.0.0.1:4242 as 'SUPER.SUPER'

debug1: using hostkeyalias: localhost-with-alias

debug3: hostkeys_foreach: reading file
"/home/git/openssh-portable/regress/known_hosts"

debug3: record_hostkey: found key type RSA in file
/home/git/openssh-portable/regress/known_hosts:1

debug3: record_hostkey: found key type ED25519 in file
/home/git/openssh-portable/regress/known_hosts:2

debug3: load_hostkeys: loaded 2 keys from localhost-with-alias

debug3: hostkeys_foreach: reading file
"/home/git/openssh-portable/regress/known_hosts"

debug3: record_hostkey: found key type RSA in file
/home/git/openssh-portable/regress/known_hosts:1

debug3: record_hostkey: found key type ED25519 in file
/home/git/openssh-portable/regress/known_hosts:2

debug3: load_hostkeys: loaded 2 keys from localhost-with-alias

debug3: order_hostkeyalgs: prefer hostkeyalgs:
ssh-ed25519-cert-***@openssh.com,ssh-rsa-cert-***@openssh.com,ssh-ed25519,ss
h-rsa

debug1: SSH2_MSG_KEXINIT sent

debug1: SSH2_MSG_KEXINIT received

debug2: kex_parse_kexinit:
diffie-hellman-group14-sha1,diffie-hellman-group1-sha1

debug2: kex_parse_kexinit:
ssh-ed25519-cert-***@openssh.com,ssh-rsa-cert-***@openssh.com,ssh-ed25519,ss
h-rsa,ecdsa-sha2-nistp256-cert-***@openssh.com,ecdsa-sha2-nistp384-cert-v01@
openssh.com,ecdsa-sha2-nistp521-cert-***@openssh.com,ecdsa-sha2-nistp256,ecd
sa-sha2-nistp384,ecdsa-sha2-nistp521

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: none,***@openssh.com,zlib

debug2: kex_parse_kexinit: none,***@openssh.com,zlib

debug2: kex_parse_kexinit:

debug2: kex_parse_kexinit:

debug2: first_kex_follows 0

debug2: reserved 0

debug2: kex_parse_kexinit:
curve25519-***@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2
-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1

debug2: kex_parse_kexinit: ssh-rsa,ssh-ed25519

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: none,***@openssh.com

debug2: kex_parse_kexinit: none,***@openssh.com

debug2: kex_parse_kexinit:

debug2: kex_parse_kexinit:

debug2: first_kex_follows 0

debug2: reserved 0

debug1: kex: server->client aes128-ctr hmac-sha1 none

debug1: kex: client->server aes128-ctr hmac-sha1 none

debug1: sending SSH2_MSG_KEXDH_INIT

debug2: bits set: 1008/2048

debug1: expecting SSH2_MSG_KEXDH_REPLY

debug1: Server host key: ssh-ed25519
SHA256:lxDml05WuoE61IZePHCwjGYK3aZfa8URdyghBnnBMlA

debug1: using hostkeyalias: localhost-with-alias

debug3: hostkeys_foreach: reading file
"/home/git/openssh-portable/regress/known_hosts"

debug3: record_hostkey: found key type RSA in file
/home/git/openssh-portable/regress/known_hosts:1

debug3: record_hostkey: found key type ED25519 in file
/home/git/openssh-portable/regress/known_hosts:2

debug3: load_hostkeys: loaded 2 keys from localhost-with-alias

debug3: hostkeys_foreach: reading file
"/home/git/openssh-portable/regress/known_hosts"

debug3: record_hostkey: found key type RSA in file
/home/git/openssh-portable/regress/known_hosts:1

debug3: record_hostkey: found key type ED25519 in file
/home/git/openssh-portable/regress/known_hosts:2

debug3: load_hostkeys: loaded 2 keys from localhost-with-alias

debug1: Host 'localhost-with-alias' is known and matches the ED25519 host
key.

debug1: Found key in /home/git/openssh-portable/regress/known_hosts:2

debug2: bits set: 1042/2048

debug2: set_newkeys: mode 1

debug1: SSH2_MSG_NEWKEYS sent

debug1: expecting SSH2_MSG_NEWKEYS

debug2: set_newkeys: mode 0

debug1: SSH2_MSG_NEWKEYS received

debug1: SSH2_MSG_SERVICE_REQUEST sent

debug2: service_accept: ssh-userauth

debug1: SSH2_MSG_SERVICE_ACCEPT received

debug2: key: /home/git/openssh-portable/regress/rsa (8023bd0), explicit

debug2: key: /home/git/openssh-portable/regress/ed25519 (80235c0), explicit

debug1: Authentications that can continue:
publickey,password,keyboard-interactive

debug3: start over, passed a different list
publickey,password,keyboard-interactive

debug3: preferred publickey

debug3: authmethod_lookup publickey

debug3: remaining preferred:

debug3: authmethod_is_enabled publickey

debug1: Next authentication method: publickey

debug1: Offering RSA public key: /home/git/openssh-portable/regress/rsa

debug3: send_pubkey_test

debug2: we sent a publickey packet, wait for reply

debug1: Server accepts key: pkalg ssh-rsa blen 279

debug2: input_userauth_pk_ok: fp
SHA256:MhINGDV8/uc+x3B2JvlET1kfV3ZBdQqFlTca3CE7wNM

debug3: sign_and_send_pubkey: RSA
SHA256:MhINGDV8/uc+x3B2JvlET1kfV3ZBdQqFlTca3CE7wNM

debug1: Authentication succeeded (publickey).

Authenticated to 127.0.0.1 (via proxy).

debug2: fd 7 setting O_NONBLOCK

debug1: channel 0: new [client-session]

debug3: ssh_session2_open: channel_new: 0

debug2: channel 0: send open

debug1: Requesting no-more-***@openssh.com

debug1: Entering interactive session.

debug1: client_input_global_request: rtype hostkeys-***@openssh.com
want_reply 0

debug2: callback start

debug2: client_session2_setup: id 0

debug1: Sending command: printf "%4096s" " "

debug2: channel 0: request exec confirm 1

debug2: callback done

debug2: channel 0: open confirm rwindow 0 rmax 32768

debug2: channel 0: rcvd adjust 2097152

debug2: channel_input_status_confirm: type 99 id 0

debug2: exec request accepted on channel 0

debug2: channel 0: rcvd eof

debug2: channel 0: output open -> drain

debug2: channel 0: obuf empty

debug2: channel 0: close_write

debug2: channel 0: output drain -> closed

debug1: client_input_channel_req: channel 0 rtype exit-signal reply 0

debug1: client_input_channel_req: channel 0 rtype ***@openssh.com reply 0

debug2: channel 0: rcvd eow

debug2: channel 0: close_read

debug2: channel 0: input open -> closed

debug2: channel 0: rcvd close

debug3: channel 0: will not send data after close

debug2: channel 0: almost dead

debug2: channel 0: gc: notify user

debug2: channel 0: gc: user detached

debug2: channel 0: send close

debug2: channel 0: is dead

debug2: channel 0: garbage collecting

debug1: channel 0: free: client-session, nchannels 1

debug3: channel 0: status: The following connections are open:

#0 client-session (t4 r0 i3/0 o3/0 fd -1/-1 cc -1)



debug1: fd 1 clearing O_NONBLOCK

Transferred: sent 2064, received 1760 bytes, in 0.0 seconds

Bytes per second: sent 54187.5, received 46206.4

debug1: Exit status -1

FAIL: unexpected error mac hmac-sha1 at 2904: Bytes per second: sent
54187.5, received 46206.4.



trace: test integrity: hmac-sha1 @2905

debug1: Executing proxy command: exec sh
/home/git/openssh-portable/regress/sshd-log-wrapper.sh
/home/git/openssh-portable/regress/sshd.log /home/git/openssh-portable/sshd
-i -f /home/git/openssh-portable/regress/sshd_proxy |
/home/git/openssh-portable/regress/modpipe -wm xor:2905:1

debug1: permanently_drop_suid: 65535

debug1: identity file /home/git/openssh-portable/regress/rsa type 1

debug1: key_load_public: No such file or directory

debug1: identity file /home/git/openssh-portable/regress/rsa-cert type -1

debug1: identity file /home/git/openssh-portable/regress/ed25519 type 4

debug1: key_load_public: No such file or directory

debug1: identity file /home/git/openssh-portable/regress/ed25519-cert type
-1

debug1: Enabling compatibility mode for protocol 2.0

debug1: Local version string SSH-2.0-OpenSSH_7.1

debug1: Remote protocol version 2.0, remote software version OpenSSH_7.1

debug1: match: OpenSSH_7.1 pat OpenSSH* compat 0x04000000

debug2: fd 6 setting O_NONBLOCK

debug2: fd 5 setting O_NONBLOCK

debug1: Authenticating to 127.0.0.1:4242 as 'SUPER.SUPER'

debug1: using hostkeyalias: localhost-with-alias

debug3: hostkeys_foreach: reading file
"/home/git/openssh-portable/regress/known_hosts"

debug3: record_hostkey: found key type RSA in file
/home/git/openssh-portable/regress/known_hosts:1

debug3: record_hostkey: found key type ED25519 in file
/home/git/openssh-portable/regress/known_hosts:2

debug3: load_hostkeys: loaded 2 keys from localhost-with-alias

debug3: hostkeys_foreach: reading file
"/home/git/openssh-portable/regress/known_hosts"

debug3: record_hostkey: found key type RSA in file
/home/git/openssh-portable/regress/known_hosts:1

debug3: record_hostkey: found key type ED25519 in file
/home/git/openssh-portable/regress/known_hosts:2

debug3: load_hostkeys: loaded 2 keys from localhost-with-alias

debug3: order_hostkeyalgs: prefer hostkeyalgs:
ssh-ed25519-cert-***@openssh.com,ssh-rsa-cert-***@openssh.com,ssh-ed25519,ss
h-rsa

debug1: SSH2_MSG_KEXINIT sent

debug1: SSH2_MSG_KEXINIT received

debug2: kex_parse_kexinit:
diffie-hellman-group14-sha1,diffie-hellman-group1-sha1

debug2: kex_parse_kexinit:
ssh-ed25519-cert-***@openssh.com,ssh-rsa-cert-***@openssh.com,ssh-ed25519,ss
h-rsa,ecdsa-sha2-nistp256-cert-***@openssh.com,ecdsa-sha2-nistp384-cert-v01@
openssh.com,ecdsa-sha2-nistp521-cert-***@openssh.com,ecdsa-sha2-nistp256,ecd
sa-sha2-nistp384,ecdsa-sha2-nistp521

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: none,***@openssh.com,zlib

debug2: kex_parse_kexinit: none,***@openssh.com,zlib

debug2: kex_parse_kexinit:

debug2: kex_parse_kexinit:

debug2: first_kex_follows 0

debug2: reserved 0

debug2: kex_parse_kexinit:
curve25519-***@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2
-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1

debug2: kex_parse_kexinit: ssh-rsa,ssh-ed25519

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: none,***@openssh.com

debug2: kex_parse_kexinit: none,***@openssh.com

debug2: kex_parse_kexinit:

debug2: kex_parse_kexinit:

debug2: first_kex_follows 0

debug2: reserved 0

debug1: kex: server->client aes128-ctr hmac-sha1 none

debug1: kex: client->server aes128-ctr hmac-sha1 none

debug1: sending SSH2_MSG_KEXDH_INIT

debug2: bits set: 1044/2048

debug1: expecting SSH2_MSG_KEXDH_REPLY

FATAL:



trace: test integrity: hmac-sha1 @2905

debug1: Executing proxy command: exec sh
/home/git/openssh-portable/regress/sshd-log-wrapper.sh
/home/git/openssh-portable/regress/sshd.log /home/git/openssh-portable/sshd
-i -f /home/git/openssh-portable/regress/sshd_proxy |
/home/git/openssh-portable/regress/modpipe -wm xor:2905:1

debug1: permanently_drop_suid: 65535

debug1: identity file /home/git/openssh-portable/regress/rsa type 1

debug1: key_load_public: No such file or directory

debug1: identity file /home/git/openssh-portable/regress/rsa-cert type -1

debug1: identity file /home/git/openssh-portable/regress/ed25519 type 4

debug1: key_load_public: No such file or directory

debug1: identity file /home/git/openssh-portable/regress/ed25519-cert type
-1

debug1: Enabling compatibility mode for protocol 2.0

debug1: Local version string SSH-2.0-OpenSSH_7.1

debug1: Remote protocol version 2.0, remote software version OpenSSH_7.1

debug1: match: OpenSSH_7.1 pat OpenSSH* compat 0x04000000

debug2: fd 6 setting O_NONBLOCK

debug2: fd 5 setting O_NONBLOCK

debug1: Authenticating to 127.0.0.1:4242 as 'SUPER.SUPER'

debug1: using hostkeyalias: localhost-with-alias

debug3: hostkeys_foreach: reading file
"/home/git/openssh-portable/regress/known_hosts"

debug3: record_hostkey: found key type RSA in file
/home/git/openssh-portable/regress/known_hosts:1

debug3: record_hostkey: found key type ED25519 in file
/home/git/openssh-portable/regress/known_hosts:2

debug3: load_hostkeys: loaded 2 keys from localhost-with-alias

debug3: hostkeys_foreach: reading file
"/home/git/openssh-portable/regress/known_hosts"

debug3: record_hostkey: found key type RSA in file
/home/git/openssh-portable/regress/known_hosts:1

debug3: record_hostkey: found key type ED25519 in file
/home/git/openssh-portable/regress/known_hosts:2

debug3: load_hostkeys: loaded 2 keys from localhost-with-alias

debug3: order_hostkeyalgs: prefer hostkeyalgs:
ssh-ed25519-cert-***@openssh.com,ssh-rsa-cert-***@openssh.com,ssh-ed25519,ss
h-rsa

debug1: SSH2_MSG_KEXINIT sent

debug1: SSH2_MSG_KEXINIT received

debug2: kex_parse_kexinit:
diffie-hellman-group14-sha1,diffie-hellman-group1-sha1

debug2: kex_parse_kexinit:
ssh-ed25519-cert-***@openssh.com,ssh-rsa-cert-***@openssh.com,ssh-ed25519,ss
h-rsa,ecdsa-sha2-nistp256-cert-***@openssh.com,ecdsa-sha2-nistp384-cert-v01@
openssh.com,ecdsa-sha2-nistp521-cert-***@openssh.com,ecdsa-sha2-nistp256,ecd
sa-sha2-nistp384,ecdsa-sha2-nistp521

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: none,***@openssh.com,zlib

debug2: kex_parse_kexinit: none,***@openssh.com,zlib

debug2: kex_parse_kexinit:

debug2: kex_parse_kexinit:

debug2: first_kex_follows 0

debug2: reserved 0

debug2: kex_parse_kexinit:
curve25519-***@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2
-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1

debug2: kex_parse_kexinit: ssh-rsa,ssh-ed25519

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: none,***@openssh.com

debug2: kex_parse_kexinit: none,***@openssh.com

debug2: kex_parse_kexinit:

debug2: kex_parse_kexinit:

debug2: first_kex_follows 0

debug2: reserved 0

debug1: kex: server->client aes128-ctr hmac-sha1 none

debug1: kex: client->server aes128-ctr hmac-sha1 none

debug1: sending SSH2_MSG_KEXDH_INIT

debug2: bits set: 1044/2048

debug1: expecting SSH2_MSG_KEXDH_REPLY

FATAL:

FAIL:





***************** failed-sshd.log ************



trace: test integrity: hmac-sha1 @2900

debug1: inetd sockets after dupping: 4, 5

Connection from UNKNOWN port 65535 on UNKNOWN port 65535

debug1: Client protocol version 2.0; client software version OpenSSH_7.1

debug1: match: OpenSSH_7.1 pat OpenSSH* compat 0x04000000

debug1: Enabling compatibility mode for protocol 2.0

debug1: Local version string SSH-2.0-OpenSSH_7.1

debug2: fd 4 setting O_NONBLOCK

debug2: fd 5 setting O_NONBLOCK

debug1: list_hostkey_types: ssh-rsa,ssh-ed25519

debug1: SSH2_MSG_KEXINIT sent

debug1: SSH2_MSG_KEXINIT received

debug2: kex_parse_kexinit:
curve25519-***@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2
-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1

debug2: kex_parse_kexinit: ssh-rsa,ssh-ed25519

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: none,***@openssh.com

debug2: kex_parse_kexinit: none,***@openssh.com

debug2: kex_parse_kexinit:

debug2: kex_parse_kexinit:

debug2: first_kex_follows 0

debug2: reserved 0

debug2: kex_parse_kexinit:
diffie-hellman-group14-sha1,diffie-hellman-group1-sha1

debug2: kex_parse_kexinit:
ssh-ed25519-cert-***@openssh.com,ssh-rsa-cert-***@openssh.com,ssh-ed25519,ss
h-rsa,ecdsa-sha2-nistp256-cert-***@openssh.com,ecdsa-sha2-nistp384-cert-v01@
openssh.com,ecdsa-sha2-nistp521-cert-***@openssh.com,ecdsa-sha2-nistp256,ecd
sa-sha2-nistp384,ecdsa-sha2-nistp521

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: none,***@openssh.com,zlib

debug2: kex_parse_kexinit: none,***@openssh.com,zlib

debug2: kex_parse_kexinit:

debug2: kex_parse_kexinit:

debug2: first_kex_follows 0

debug2: reserved 0

debug1: kex: client->server aes128-ctr hmac-sha1 none

debug1: kex: server->client aes128-ctr hmac-sha1 none

debug2: bits set: 1053/2048

debug1: expecting SSH2_MSG_KEXDH_INIT

debug2: bits set: 1001/2048

debug2: set_newkeys: mode 1

debug1: SSH2_MSG_NEWKEYS sent

debug1: expecting SSH2_MSG_NEWKEYS

debug2: set_newkeys: mode 0

debug1: SSH2_MSG_NEWKEYS received

debug1: KEX done

debug1: userauth-request for user SUPER.SUPER service ssh-connection method
none

debug1: attempt 0 failures 0

debug2: parse_server_config: config reprocess config len 475

debug2: input_userauth_request: setting up authctxt for SUPER.SUPER

debug2: input_userauth_request: try method none

Failed none for SUPER.SUPER from UNKNOWN port 65535 ssh2

debug3: userauth_finish: failure partial=0 next
methods="publickey,password,keyboard-interactive"

debug1: userauth-request for user SUPER.SUPER service ssh-connection method
publickey

debug1: attempt 1 failures 0

debug2: input_userauth_request: try method publickey

debug1: test whether pkalg/pkblob are acceptable

debug1: temporarily_use_uid: 65535/255 (e=65535/255)

debug1: trying public key file
/home/git/openssh-portable/regress/authorized_keys_SUPER.SUPER

debug1: fd 6 clearing O_NONBLOCK

debug1: matching key found: file
/home/git/openssh-portable/regress/authorized_keys_SUPER.SUPER, line 1 RSA
SHA256:MhINGDV8/uc+x3B2JvlET1kfV3ZBdQqFlTca3CE7wNM

debug1: restore_uid: 65535/255

debug2: userauth_pubkey: authenticated 0 pkalg ssh-rsa

Postponed publickey for SUPER.SUPER from UNKNOWN port 65535 ssh2

debug1: userauth-request for user SUPER.SUPER service ssh-connection method
publickey

debug1: attempt 2 failures 0

debug2: input_userauth_request: try method publickey

debug1: temporarily_use_uid: 65535/255 (e=65535/255)

debug1: trying public key file
/home/git/openssh-portable/regress/authorized_keys_SUPER.SUPER

debug1: fd 6 clearing O_NONBLOCK

debug1: matching key found: file
/home/git/openssh-portable/regress/authorized_keys_SUPER.SUPER, line 1 RSA
SHA256:MhINGDV8/uc+x3B2JvlET1kfV3ZBdQqFlTca3CE7wNM

debug1: restore_uid: 65535/255

debug2: userauth_pubkey: authenticated 1 pkalg ssh-rsa

Accepted publickey for SUPER.SUPER from UNKNOWN port 65535 ssh2: RSA
SHA256:MhINGDV8/uc+x3B2JvlET1kfV3ZBdQqFlTca3CE7wNM

debug3: notify_hostkeys: key 0: ssh-rsa
SHA256:MhINGDV8/uc+x3B2JvlET1kfV3ZBdQqFlTca3CE7wNM

debug3: notify_hostkeys: key 1: ssh-ed25519
SHA256:lxDml05WuoE61IZePHCwjGYK3aZfa8URdyghBnnBMlA

debug3: notify_hostkeys: sent 2 hostkeys

debug1: Entering interactive session for SSH2.

debug2: fd 6 setting O_NONBLOCK

debug2: fd 7 setting O_NONBLOCK

debug1: server_init_dispatch_20

debug1: server_input_channel_open: ctype session rchan 0 win 2097152 max
32768

debug1: input_session_request

debug1: channel 0: new [server-session]

debug2: session_new: allocate (allocated 0 max 10)

debug3: session_unused: session id 0 unused

debug1: session_new: session 0

debug1: session_open: channel 0

debug1: session_open: session 0: link with channel 0

debug1: server_input_channel_open: confirm session

debug1: server_input_global_request: rtype no-more-***@openssh.com
want_reply 0

debug1: server_input_channel_req: channel 0 request exec reply 1

debug1: session_by_channel: session 0 channel 0

debug1: session_input_channel_req: session 0 req exec

Starting session: command for SUPER.SUPER from UNKNOWN port 65535

debug2: fd 10 setting O_NONBLOCK

debug2: fd 9 setting O_NONBLOCK

debug2: fd 12 setting O_NONBLOCK

debug1: permanently_set_uid: 65535/255

debug2: channel 0: read 0 from efd 12

debug2: channel 0: closing read-efd 12

debug2: channel 0: read<=0 rfd 10 len 0

debug2: channel 0: read failed

debug2: channel 0: close_read

debug2: channel 0: input open -> drain

debug2: channel 0: ibuf empty

debug2: channel 0: send eof

debug2: channel 0: input drain -> closed

debug1: Received SIGCHLD.

debug1: session_by_pid: pid 1509949533

debug1: session_exit_message: session 0 channel 0 pid 1509949533

debug2: channel 0: request exit-signal confirm 0

debug1: session_exit_message: release channel 0

debug2: channel 0: write failed

debug2: channel 0: close_write

debug2: channel 0: send eow

debug2: channel 0: output open -> closed

debug2: channel 0: send close

debug3: channel 0: will not send data after close

debug2: notify_done: reading

debug3: channel 0: will not send data after close

debug2: channel 0: rcvd close

Received disconnect from UNKNOWN: 11: disconnected by user

Disconnected from UNKNOWN

debug1: do_cleanup

FAIL: unexpected error mac hmac-sha1 at 2900: Bytes per second: sent
65665.7, received 55994.0.



trace: test integrity: hmac-sha1 @2901

debug1: inetd sockets after dupping: 4, 5

Connection from UNKNOWN port 65535 on UNKNOWN port 65535

debug1: Client protocol version 2.0; client software version OpenSSH_7.1

debug1: match: OpenSSH_7.1 pat OpenSSH* compat 0x04000000

debug1: Enabling compatibility mode for protocol 2.0

debug1: Local version string SSH-2.0-OpenSSH_7.1

debug2: fd 4 setting O_NONBLOCK

debug2: fd 5 setting O_NONBLOCK

debug1: list_hostkey_types: ssh-rsa,ssh-ed25519

debug1: SSH2_MSG_KEXINIT sent

debug1: SSH2_MSG_KEXINIT received

debug2: kex_parse_kexinit:
curve25519-***@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2
-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1

debug2: kex_parse_kexinit: ssh-rsa,ssh-ed25519

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: none,***@openssh.com

debug2: kex_parse_kexinit: none,***@openssh.com

debug2: kex_parse_kexinit:

debug2: kex_parse_kexinit:

debug2: first_kex_follows 0

debug2: reserved 0

debug2: kex_parse_kexinit:
diffie-hellman-group14-sha1,diffie-hellman-group1-sha1

debug2: kex_parse_kexinit:
ssh-ed25519-cert-***@openssh.com,ssh-rsa-cert-***@openssh.com,ssh-ed25519,ss
h-rsa,ecdsa-sha2-nistp256-cert-***@openssh.com,ecdsa-sha2-nistp384-cert-v01@
openssh.com,ecdsa-sha2-nistp521-cert-***@openssh.com,ecdsa-sha2-nistp256,ecd
sa-sha2-nistp384,ecdsa-sha2-nistp521

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: none,***@openssh.com,zlib

debug2: kex_parse_kexinit: none,***@openssh.com,zlib

debug2: kex_parse_kexinit:

debug2: kex_parse_kexinit:

debug2: first_kex_follows 0

debug2: reserved 0

debug1: kex: client->server aes128-ctr hmac-sha1 none

debug1: kex: server->client aes128-ctr hmac-sha1 none

debug2: bits set: 1014/2048

debug1: expecting SSH2_MSG_KEXDH_INIT

debug2: bits set: 1027/2048

debug2: set_newkeys: mode 1

debug1: SSH2_MSG_NEWKEYS sent

debug1: expecting SSH2_MSG_NEWKEYS

debug2: set_newkeys: mode 0

debug1: SSH2_MSG_NEWKEYS received

debug1: KEX done

debug1: userauth-request for user SUPER.SUPER service ssh-connection method
none

debug1: attempt 0 failures 0

debug2: parse_server_config: config reprocess config len 475

debug2: input_userauth_request: setting up authctxt for SUPER.SUPER

debug2: input_userauth_request: try method none

Failed none for SUPER.SUPER from UNKNOWN port 65535 ssh2

debug3: userauth_finish: failure partial=0 next
methods="publickey,password,keyboard-interactive"

debug1: userauth-request for user SUPER.SUPER service ssh-connection method
publickey

debug1: attempt 1 failures 0

debug2: input_userauth_request: try method publickey

debug1: test whether pkalg/pkblob are acceptable

debug1: temporarily_use_uid: 65535/255 (e=65535/255)

debug1: trying public key file
/home/git/openssh-portable/regress/authorized_keys_SUPER.SUPER

debug1: fd 6 clearing O_NONBLOCK

debug1: matching key found: file
/home/git/openssh-portable/regress/authorized_keys_SUPER.SUPER, line 1 RSA
SHA256:MhINGDV8/uc+x3B2JvlET1kfV3ZBdQqFlTca3CE7wNM

debug1: restore_uid: 65535/255

debug2: userauth_pubkey: authenticated 0 pkalg ssh-rsa

Postponed publickey for SUPER.SUPER from UNKNOWN port 65535 ssh2

debug1: userauth-request for user SUPER.SUPER service ssh-connection method
publickey

debug1: attempt 2 failures 0

debug2: input_userauth_request: try method publickey

debug1: temporarily_use_uid: 65535/255 (e=65535/255)

debug1: trying public key file
/home/git/openssh-portable/regress/authorized_keys_SUPER.SUPER

debug1: fd 6 clearing O_NONBLOCK

debug1: matching key found: file
/home/git/openssh-portable/regress/authorized_keys_SUPER.SUPER, line 1 RSA
SHA256:MhINGDV8/uc+x3B2JvlET1kfV3ZBdQqFlTca3CE7wNM

debug1: restore_uid: 65535/255

debug2: userauth_pubkey: authenticated 1 pkalg ssh-rsa

Accepted publickey for SUPER.SUPER from UNKNOWN port 65535 ssh2: RSA
SHA256:MhINGDV8/uc+x3B2JvlET1kfV3ZBdQqFlTca3CE7wNM

debug3: notify_hostkeys: key 0: ssh-rsa
SHA256:MhINGDV8/uc+x3B2JvlET1kfV3ZBdQqFlTca3CE7wNM

debug3: notify_hostkeys: key 1: ssh-ed25519
SHA256:lxDml05WuoE61IZePHCwjGYK3aZfa8URdyghBnnBMlA

debug3: notify_hostkeys: sent 2 hostkeys

debug1: Entering interactive session for SSH2.

debug2: fd 6 setting O_NONBLOCK

debug2: fd 7 setting O_NONBLOCK

debug1: server_init_dispatch_20

debug1: server_input_channel_open: ctype session rchan 0 win 2097152 max
32768

debug1: input_session_request

debug1: channel 0: new [server-session]

debug2: session_new: allocate (allocated 0 max 10)

debug3: session_unused: session id 0 unused

debug1: session_new: session 0

debug1: session_open: channel 0

debug1: session_open: session 0: link with channel 0

debug1: server_input_channel_open: confirm session

debug1: server_input_global_request: rtype no-more-***@openssh.com
want_reply 0

debug1: server_input_channel_req: channel 0 request exec reply 1

debug1: session_by_channel: session 0 channel 0

debug1: session_input_channel_req: session 0 req exec

Starting session: command for SUPER.SUPER from UNKNOWN port 65535

debug2: fd 10 setting O_NONBLOCK

debug2: fd 9 setting O_NONBLOCK

debug2: fd 12 setting O_NONBLOCK

debug1: permanently_set_uid: 65535/255

debug2: channel 0: read 0 from efd 12

debug2: channel 0: closing read-efd 12

debug2: channel 0: read<=0 rfd 10 len 0

debug2: channel 0: read failed

debug2: channel 0: close_read

debug2: channel 0: input open -> drain

debug2: channel 0: ibuf empty

debug2: channel 0: send eof

debug2: channel 0: input drain -> closed

debug1: Received SIGCHLD.

debug1: session_by_pid: pid 1526726749

debug1: session_exit_message: session 0 channel 0 pid 1526726749

debug2: channel 0: request exit-signal confirm 0

debug1: session_exit_message: release channel 0

debug2: channel 0: write failed

debug2: channel 0: close_write

debug2: channel 0: send eow

debug2: channel 0: output open -> closed

debug2: channel 0: send close

debug3: channel 0: will not send data after close

debug2: notify_done: reading

debug3: channel 0: will not send data after close

debug2: channel 0: rcvd close

Received disconnect from UNKNOWN: 11: disconnected by user

Disconnected from UNKNOWN

debug1: do_cleanup

FAIL: unexpected error mac hmac-sha1 at 2901: Bytes per second: sent
36686.1, received 31282.7.



trace: test integrity: hmac-sha1 @2902

debug1: inetd sockets after dupping: 4, 5

Connection from UNKNOWN port 65535 on UNKNOWN port 65535

debug1: Client protocol version 2.0; client software version OpenSSH_7.1

debug1: match: OpenSSH_7.1 pat OpenSSH* compat 0x04000000

debug1: Enabling compatibility mode for protocol 2.0

debug1: Local version string SSH-2.0-OpenSSH_7.1

debug2: fd 4 setting O_NONBLOCK

debug2: fd 5 setting O_NONBLOCK

debug1: list_hostkey_types: ssh-rsa,ssh-ed25519

debug1: SSH2_MSG_KEXINIT sent

debug1: SSH2_MSG_KEXINIT received

debug2: kex_parse_kexinit:
curve25519-***@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2
-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1

debug2: kex_parse_kexinit: ssh-rsa,ssh-ed25519

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: none,***@openssh.com

debug2: kex_parse_kexinit: none,***@openssh.com

debug2: kex_parse_kexinit:

debug2: kex_parse_kexinit:

debug2: first_kex_follows 0

debug2: reserved 0

debug2: kex_parse_kexinit:
diffie-hellman-group14-sha1,diffie-hellman-group1-sha1

debug2: kex_parse_kexinit:
ssh-ed25519-cert-***@openssh.com,ssh-rsa-cert-***@openssh.com,ssh-ed25519,ss
h-rsa,ecdsa-sha2-nistp256-cert-***@openssh.com,ecdsa-sha2-nistp384-cert-v01@
openssh.com,ecdsa-sha2-nistp521-cert-***@openssh.com,ecdsa-sha2-nistp256,ecd
sa-sha2-nistp384,ecdsa-sha2-nistp521

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: none,***@openssh.com,zlib

debug2: kex_parse_kexinit: none,***@openssh.com,zlib

debug2: kex_parse_kexinit:

debug2: kex_parse_kexinit:

debug2: first_kex_follows 0

debug2: reserved 0

debug1: kex: client->server aes128-ctr hmac-sha1 none

debug1: kex: server->client aes128-ctr hmac-sha1 none

debug2: bits set: 1015/2048

debug1: expecting SSH2_MSG_KEXDH_INIT

debug2: bits set: 984/2048

debug2: set_newkeys: mode 1

debug1: SSH2_MSG_NEWKEYS sent

debug1: expecting SSH2_MSG_NEWKEYS

debug2: set_newkeys: mode 0

debug1: SSH2_MSG_NEWKEYS received

debug1: KEX done

debug1: userauth-request for user SUPER.SUPER service ssh-connection method
none

debug1: attempt 0 failures 0

debug2: parse_server_config: config reprocess config len 475

debug2: input_userauth_request: setting up authctxt for SUPER.SUPER

debug2: input_userauth_request: try method none

Failed none for SUPER.SUPER from UNKNOWN port 65535 ssh2

debug3: userauth_finish: failure partial=0 next
methods="publickey,password,keyboard-interactive"

debug1: userauth-request for user SUPER.SUPER service ssh-connection method
publickey

debug1: attempt 1 failures 0

debug2: input_userauth_request: try method publickey

debug1: test whether pkalg/pkblob are acceptable

debug1: temporarily_use_uid: 65535/255 (e=65535/255)

debug1: trying public key file
/home/git/openssh-portable/regress/authorized_keys_SUPER.SUPER

debug1: fd 6 clearing O_NONBLOCK

debug1: matching key found: file
/home/git/openssh-portable/regress/authorized_keys_SUPER.SUPER, line 1 RSA
SHA256:MhINGDV8/uc+x3B2JvlET1kfV3ZBdQqFlTca3CE7wNM

debug1: restore_uid: 65535/255

debug2: userauth_pubkey: authenticated 0 pkalg ssh-rsa

Postponed publickey for SUPER.SUPER from UNKNOWN port 65535 ssh2

debug1: userauth-request for user SUPER.SUPER service ssh-connection method
publickey

debug1: attempt 2 failures 0

debug2: input_userauth_request: try method publickey

debug1: temporarily_use_uid: 65535/255 (e=65535/255)

debug1: trying public key file
/home/git/openssh-portable/regress/authorized_keys_SUPER.SUPER

debug1: fd 6 clearing O_NONBLOCK

debug1: matching key found: file
/home/git/openssh-portable/regress/authorized_keys_SUPER.SUPER, line 1 RSA
SHA256:MhINGDV8/uc+x3B2JvlET1kfV3ZBdQqFlTca3CE7wNM

debug1: restore_uid: 65535/255

debug2: userauth_pubkey: authenticated 1 pkalg ssh-rsa

Accepted publickey for SUPER.SUPER from UNKNOWN port 65535 ssh2: RSA
SHA256:MhINGDV8/uc+x3B2JvlET1kfV3ZBdQqFlTca3CE7wNM

debug3: notify_hostkeys: key 0: ssh-rsa
SHA256:MhINGDV8/uc+x3B2JvlET1kfV3ZBdQqFlTca3CE7wNM

debug3: notify_hostkeys: key 1: ssh-ed25519
SHA256:lxDml05WuoE61IZePHCwjGYK3aZfa8URdyghBnnBMlA

debug3: notify_hostkeys: sent 2 hostkeys

debug1: Entering interactive session for SSH2.

debug2: fd 6 setting O_NONBLOCK

debug2: fd 7 setting O_NONBLOCK

debug1: server_init_dispatch_20

debug1: server_input_channel_open: ctype session rchan 0 win 2097152 max
32768

debug1: input_session_request

debug1: channel 0: new [server-session]

debug2: session_new: allocate (allocated 0 max 10)

debug3: session_unused: session id 0 unused

debug1: session_new: session 0

debug1: session_open: channel 0

debug1: session_open: session 0: link with channel 0

debug1: server_input_channel_open: confirm session

debug1: server_input_global_request: rtype no-more-***@openssh.com
want_reply 0

debug1: server_input_channel_req: channel 0 request exec reply 1

debug1: session_by_channel: session 0 channel 0

debug1: session_input_channel_req: session 0 req exec

Starting session: command for SUPER.SUPER from UNKNOWN port 65535

debug2: fd 10 setting O_NONBLOCK

debug2: fd 9 setting O_NONBLOCK

debug2: fd 12 setting O_NONBLOCK

debug1: permanently_set_uid: 65535/255

debug2: channel 0: read 0 from efd 12

debug2: channel 0: closing read-efd 12

debug2: channel 0: read<=0 rfd 10 len 0

debug2: channel 0: read failed

debug2: channel 0: close_read

debug2: channel 0: input open -> drain

debug2: channel 0: ibuf empty

debug2: channel 0: send eof

debug2: channel 0: input drain -> closed

debug1: Received SIGCHLD.

debug1: session_by_pid: pid 1543503965

debug1: session_exit_message: session 0 channel 0 pid 1543503965

debug2: channel 0: request exit-signal confirm 0

debug1: session_exit_message: release channel 0

debug2: channel 0: write failed

debug2: channel 0: close_write

debug2: channel 0: send eow

debug2: channel 0: output open -> closed

debug2: channel 0: send close

debug3: channel 0: will not send data after close

debug2: notify_done: reading

debug3: channel 0: will not send data after close

debug2: channel 0: rcvd close

Received disconnect from UNKNOWN: 11: disconnected by user

Disconnected from UNKNOWN

debug1: do_cleanup

FAIL: unexpected error mac hmac-sha1 at 2902: Bytes per second: sent
33328.0, received 28419.2.



trace: test integrity: hmac-sha1 @2903

debug1: inetd sockets after dupping: 4, 5

Connection from UNKNOWN port 65535 on UNKNOWN port 65535

debug1: Client protocol version 2.0; client software version OpenSSH_7.1

debug1: match: OpenSSH_7.1 pat OpenSSH* compat 0x04000000

debug1: Enabling compatibility mode for protocol 2.0

debug1: Local version string SSH-2.0-OpenSSH_7.1

debug2: fd 4 setting O_NONBLOCK

debug2: fd 5 setting O_NONBLOCK

debug1: list_hostkey_types: ssh-rsa,ssh-ed25519

debug1: SSH2_MSG_KEXINIT sent

debug1: SSH2_MSG_KEXINIT received

debug2: kex_parse_kexinit:
curve25519-***@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2
-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1

debug2: kex_parse_kexinit: ssh-rsa,ssh-ed25519

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: none,***@openssh.com

debug2: kex_parse_kexinit: none,***@openssh.com

debug2: kex_parse_kexinit:

debug2: kex_parse_kexinit:

debug2: first_kex_follows 0

debug2: reserved 0

debug2: kex_parse_kexinit:
diffie-hellman-group14-sha1,diffie-hellman-group1-sha1

debug2: kex_parse_kexinit:
ssh-ed25519-cert-***@openssh.com,ssh-rsa-cert-***@openssh.com,ssh-ed25519,ss
h-rsa,ecdsa-sha2-nistp256-cert-***@openssh.com,ecdsa-sha2-nistp384-cert-v01@
openssh.com,ecdsa-sha2-nistp521-cert-***@openssh.com,ecdsa-sha2-nistp256,ecd
sa-sha2-nistp384,ecdsa-sha2-nistp521

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: none,***@openssh.com,zlib

debug2: kex_parse_kexinit: none,***@openssh.com,zlib

debug2: kex_parse_kexinit:

debug2: kex_parse_kexinit:

debug2: first_kex_follows 0

debug2: reserved 0

debug1: kex: client->server aes128-ctr hmac-sha1 none

debug1: kex: server->client aes128-ctr hmac-sha1 none

debug2: bits set: 993/2048

debug1: expecting SSH2_MSG_KEXDH_INIT

debug2: bits set: 1010/2048

debug2: set_newkeys: mode 1

debug1: SSH2_MSG_NEWKEYS sent

debug1: expecting SSH2_MSG_NEWKEYS

debug2: set_newkeys: mode 0

debug1: SSH2_MSG_NEWKEYS received

debug1: KEX done

debug1: userauth-request for user SUPER.SUPER service ssh-connection method
none

debug1: attempt 0 failures 0

debug2: parse_server_config: config reprocess config len 475

debug2: input_userauth_request: setting up authctxt for SUPER.SUPER

debug2: input_userauth_request: try method none

Failed none for SUPER.SUPER from UNKNOWN port 65535 ssh2

debug3: userauth_finish: failure partial=0 next
methods="publickey,password,keyboard-interactive"

debug1: userauth-request for user SUPER.SUPER service ssh-connection method
publickey

debug1: attempt 1 failures 0

debug2: input_userauth_request: try method publickey

debug1: test whether pkalg/pkblob are acceptable

debug1: temporarily_use_uid: 65535/255 (e=65535/255)

debug1: trying public key file
/home/git/openssh-portable/regress/authorized_keys_SUPER.SUPER

debug1: fd 6 clearing O_NONBLOCK

debug1: matching key found: file
/home/git/openssh-portable/regress/authorized_keys_SUPER.SUPER, line 1 RSA
SHA256:MhINGDV8/uc+x3B2JvlET1kfV3ZBdQqFlTca3CE7wNM

debug1: restore_uid: 65535/255

debug2: userauth_pubkey: authenticated 0 pkalg ssh-rsa

Postponed publickey for SUPER.SUPER from UNKNOWN port 65535 ssh2

debug1: userauth-request for user SUPER.SUPER service ssh-connection method
publickey

debug1: attempt 2 failures 0

debug2: input_userauth_request: try method publickey

debug1: temporarily_use_uid: 65535/255 (e=65535/255)

debug1: trying public key file
/home/git/openssh-portable/regress/authorized_keys_SUPER.SUPER

debug1: fd 6 clearing O_NONBLOCK

debug1: matching key found: file
/home/git/openssh-portable/regress/authorized_keys_SUPER.SUPER, line 1 RSA
SHA256:MhINGDV8/uc+x3B2JvlET1kfV3ZBdQqFlTca3CE7wNM

debug1: restore_uid: 65535/255

debug2: userauth_pubkey: authenticated 1 pkalg ssh-rsa

Accepted publickey for SUPER.SUPER from UNKNOWN port 65535 ssh2: RSA
SHA256:MhINGDV8/uc+x3B2JvlET1kfV3ZBdQqFlTca3CE7wNM

debug3: notify_hostkeys: key 0: ssh-rsa
SHA256:MhINGDV8/uc+x3B2JvlET1kfV3ZBdQqFlTca3CE7wNM

debug3: notify_hostkeys: key 1: ssh-ed25519
SHA256:lxDml05WuoE61IZePHCwjGYK3aZfa8URdyghBnnBMlA

debug3: notify_hostkeys: sent 2 hostkeys

debug1: Entering interactive session for SSH2.

debug2: fd 6 setting O_NONBLOCK

debug2: fd 7 setting O_NONBLOCK

debug1: server_init_dispatch_20

debug1: server_input_channel_open: ctype session rchan 0 win 2097152 max
32768

debug1: input_session_request

debug1: channel 0: new [server-session]

debug2: session_new: allocate (allocated 0 max 10)

debug3: session_unused: session id 0 unused

debug1: session_new: session 0

debug1: session_open: channel 0

debug1: session_open: session 0: link with channel 0

debug1: server_input_channel_open: confirm session

debug1: server_input_global_request: rtype no-more-***@openssh.com
want_reply 0

debug1: server_input_channel_req: channel 0 request exec reply 1

debug1: session_by_channel: session 0 channel 0

debug1: session_input_channel_req: session 0 req exec

Starting session: command for SUPER.SUPER from UNKNOWN port 65535

debug2: fd 10 setting O_NONBLOCK

debug2: fd 9 setting O_NONBLOCK

debug2: fd 12 setting O_NONBLOCK

debug1: permanently_set_uid: 65535/255

debug2: channel 0: read 0 from efd 12

debug2: channel 0: closing read-efd 12

debug2: channel 0: read<=0 rfd 10 len 0

debug2: channel 0: read failed

debug2: channel 0: close_read

debug2: channel 0: input open -> drain

debug2: channel 0: ibuf empty

debug2: channel 0: send eof

debug2: channel 0: input drain -> closed

debug1: Received SIGCHLD.

debug1: session_by_pid: pid 1560281181

debug1: session_exit_message: session 0 channel 0 pid 1560281181

debug2: channel 0: request exit-signal confirm 0

debug1: session_exit_message: release channel 0

debug2: channel 0: write failed

debug2: channel 0: close_write

debug2: channel 0: send eow

debug2: channel 0: output open -> closed

debug2: channel 0: send close

debug3: channel 0: will not send data after close

debug2: notify_done: reading

debug3: channel 0: will not send data after close

debug2: channel 0: rcvd close

Received disconnect from UNKNOWN: 11: disconnected by user

Disconnected from UNKNOWN

debug1: do_cleanup

FAIL: unexpected error mac hmac-sha1 at 2903: Bytes per second: sent
49762.6, received 42433.2.



trace: test integrity: hmac-sha1 @2904

debug1: inetd sockets after dupping: 4, 5

Connection from UNKNOWN port 65535 on UNKNOWN port 65535

debug1: Client protocol version 2.0; client software version OpenSSH_7.1

debug1: match: OpenSSH_7.1 pat OpenSSH* compat 0x04000000

debug1: Enabling compatibility mode for protocol 2.0

debug1: Local version string SSH-2.0-OpenSSH_7.1

debug2: fd 4 setting O_NONBLOCK

debug2: fd 5 setting O_NONBLOCK

debug1: list_hostkey_types: ssh-rsa,ssh-ed25519

debug1: SSH2_MSG_KEXINIT sent

debug1: SSH2_MSG_KEXINIT received

debug2: kex_parse_kexinit:
curve25519-***@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2
-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1

debug2: kex_parse_kexinit: ssh-rsa,ssh-ed25519

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: none,***@openssh.com

debug2: kex_parse_kexinit: none,***@openssh.com

debug2: kex_parse_kexinit:

debug2: kex_parse_kexinit:

debug2: first_kex_follows 0

debug2: reserved 0

debug2: kex_parse_kexinit:
diffie-hellman-group14-sha1,diffie-hellman-group1-sha1

debug2: kex_parse_kexinit:
ssh-ed25519-cert-***@openssh.com,ssh-rsa-cert-***@openssh.com,ssh-ed25519,ss
h-rsa,ecdsa-sha2-nistp256-cert-***@openssh.com,ecdsa-sha2-nistp384-cert-v01@
openssh.com,ecdsa-sha2-nistp521-cert-***@openssh.com,ecdsa-sha2-nistp256,ecd
sa-sha2-nistp384,ecdsa-sha2-nistp521

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: none,***@openssh.com,zlib

debug2: kex_parse_kexinit: none,***@openssh.com,zlib

debug2: kex_parse_kexinit:

debug2: kex_parse_kexinit:

debug2: first_kex_follows 0

debug2: reserved 0

debug1: kex: client->server aes128-ctr hmac-sha1 none

debug1: kex: server->client aes128-ctr hmac-sha1 none

debug2: bits set: 1042/2048

debug1: expecting SSH2_MSG_KEXDH_INIT

debug2: bits set: 1008/2048

debug2: set_newkeys: mode 1

debug1: SSH2_MSG_NEWKEYS sent

debug1: expecting SSH2_MSG_NEWKEYS

debug2: set_newkeys: mode 0

debug1: SSH2_MSG_NEWKEYS received

debug1: KEX done

debug1: userauth-request for user SUPER.SUPER service ssh-connection method
none

debug1: attempt 0 failures 0

debug2: parse_server_config: config reprocess config len 475

debug2: input_userauth_request: setting up authctxt for SUPER.SUPER

debug2: input_userauth_request: try method none

Failed none for SUPER.SUPER from UNKNOWN port 65535 ssh2

debug3: userauth_finish: failure partial=0 next
methods="publickey,password,keyboard-interactive"

debug1: userauth-request for user SUPER.SUPER service ssh-connection method
publickey

debug1: attempt 1 failures 0

debug2: input_userauth_request: try method publickey

debug1: test whether pkalg/pkblob are acceptable

debug1: temporarily_use_uid: 65535/255 (e=65535/255)

debug1: trying public key file
/home/git/openssh-portable/regress/authorized_keys_SUPER.SUPER

debug1: fd 6 clearing O_NONBLOCK

debug1: matching key found: file
/home/git/openssh-portable/regress/authorized_keys_SUPER.SUPER, line 1 RSA
SHA256:MhINGDV8/uc+x3B2JvlET1kfV3ZBdQqFlTca3CE7wNM

debug1: restore_uid: 65535/255

debug2: userauth_pubkey: authenticated 0 pkalg ssh-rsa

Postponed publickey for SUPER.SUPER from UNKNOWN port 65535 ssh2

debug1: userauth-request for user SUPER.SUPER service ssh-connection method
publickey

debug1: attempt 2 failures 0

debug2: input_userauth_request: try method publickey

debug1: temporarily_use_uid: 65535/255 (e=65535/255)

debug1: trying public key file
/home/git/openssh-portable/regress/authorized_keys_SUPER.SUPER

debug1: fd 6 clearing O_NONBLOCK

debug1: matching key found: file
/home/git/openssh-portable/regress/authorized_keys_SUPER.SUPER, line 1 RSA
SHA256:MhINGDV8/uc+x3B2JvlET1kfV3ZBdQqFlTca3CE7wNM

debug1: restore_uid: 65535/255

debug2: userauth_pubkey: authenticated 1 pkalg ssh-rsa

Accepted publickey for SUPER.SUPER from UNKNOWN port 65535 ssh2: RSA
SHA256:MhINGDV8/uc+x3B2JvlET1kfV3ZBdQqFlTca3CE7wNM

debug3: notify_hostkeys: key 0: ssh-rsa
SHA256:MhINGDV8/uc+x3B2JvlET1kfV3ZBdQqFlTca3CE7wNM

debug3: notify_hostkeys: key 1: ssh-ed25519
SHA256:lxDml05WuoE61IZePHCwjGYK3aZfa8URdyghBnnBMlA

debug3: notify_hostkeys: sent 2 hostkeys

debug1: Entering interactive session for SSH2.

debug2: fd 6 setting O_NONBLOCK

debug2: fd 7 setting O_NONBLOCK

debug1: server_init_dispatch_20

debug1: server_input_channel_open: ctype session rchan 0 win 2097152 max
32768

debug1: input_session_request

debug1: channel 0: new [server-session]

debug2: session_new: allocate (allocated 0 max 10)

debug3: session_unused: session id 0 unused

debug1: session_new: session 0

debug1: session_open: channel 0

debug1: session_open: session 0: link with channel 0

debug1: server_input_channel_open: confirm session

debug1: server_input_global_request: rtype no-more-***@openssh.com
want_reply 0

debug1: server_input_channel_req: channel 0 request exec reply 1

debug1: session_by_channel: session 0 channel 0

debug1: session_input_channel_req: session 0 req exec

Starting session: command for SUPER.SUPER from UNKNOWN port 65535

debug2: fd 10 setting O_NONBLOCK

debug2: fd 9 setting O_NONBLOCK

debug2: fd 12 setting O_NONBLOCK

debug1: permanently_set_uid: 65535/255

debug2: channel 0: read 0 from efd 12

debug2: channel 0: closing read-efd 12

debug2: channel 0: read<=0 rfd 10 len 0

debug2: channel 0: read failed

debug2: channel 0: close_read

debug2: channel 0: input open -> drain

debug2: channel 0: ibuf empty

debug2: channel 0: send eof

debug2: channel 0: input drain -> closed

debug1: Received SIGCHLD.

debug1: session_by_pid: pid 1593835613

debug1: session_exit_message: session 0 channel 0 pid 1593835613

debug2: channel 0: request exit-signal confirm 0

debug1: session_exit_message: release channel 0

debug2: channel 0: write failed

debug2: channel 0: close_write

debug2: channel 0: send eow

debug2: channel 0: output open -> closed

debug2: channel 0: send close

debug3: channel 0: will not send data after close

debug2: notify_done: reading

debug3: channel 0: will not send data after close

debug2: channel 0: rcvd close

Received disconnect from UNKNOWN: 11: disconnected by user

Disconnected from UNKNOWN

debug1: do_cleanup

FAIL: unexpected error mac hmac-sha1 at 2904: Bytes per second: sent
54187.5, received 46206.4.



trace: test integrity: hmac-sha1 @2905

debug1: inetd sockets after dupping: 4, 5

Connection from UNKNOWN port 65535 on UNKNOWN port 65535

debug1: Client protocol version 2.0; client software version OpenSSH_7.1

debug1: match: OpenSSH_7.1 pat OpenSSH* compat 0x04000000

debug1: Enabling compatibility mode for protocol 2.0

debug1: Local version string SSH-2.0-OpenSSH_7.1

debug2: fd 4 setting O_NONBLOCK

debug2: fd 5 setting O_NONBLOCK

debug1: list_hostkey_types: ssh-rsa,ssh-ed25519

debug1: SSH2_MSG_KEXINIT sent

debug1: SSH2_MSG_KEXINIT received

debug2: kex_parse_kexinit:
curve25519-***@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2
-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1

debug2: kex_parse_kexinit: ssh-rsa,ssh-ed25519

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: none,***@openssh.com

debug2: kex_parse_kexinit: none,***@openssh.com

debug2: kex_parse_kexinit:

debug2: kex_parse_kexinit:

debug2: first_kex_follows 0

debug2: reserved 0

debug2: kex_parse_kexinit:
diffie-hellman-group14-sha1,diffie-hellman-group1-sha1

debug2: kex_parse_kexinit:
ssh-ed25519-cert-***@openssh.com,ssh-rsa-cert-***@openssh.com,ssh-ed25519,ss
h-rsa,ecdsa-sha2-nistp256-cert-***@openssh.com,ecdsa-sha2-nistp384-cert-v01@
openssh.com,ecdsa-sha2-nistp521-cert-***@openssh.com,ecdsa-sha2-nistp256,ecd
sa-sha2-nistp384,ecdsa-sha2-nistp521

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: none,***@openssh.com,zlib

debug2: kex_parse_kexinit: none,***@openssh.com,zlib

debug2: kex_parse_kexinit:

debug2: kex_parse_kexinit:

debug2: first_kex_follows 0

debug2: reserved 0

debug1: kex: client->server aes128-ctr hmac-sha1 none

debug1: kex: server->client aes128-ctr hmac-sha1 none

debug2: bits set: 1045/2048

debug1: expecting SSH2_MSG_KEXDH_INIT

debug2: bits set: 1044/2048

FATAL:



trace: test integrity: hmac-sha1 @2905

debug1: inetd sockets after dupping: 4, 5

Connection from UNKNOWN port 65535 on UNKNOWN port 65535

debug1: Client protocol version 2.0; client software version OpenSSH_7.1

debug1: match: OpenSSH_7.1 pat OpenSSH* compat 0x04000000

debug1: Enabling compatibility mode for protocol 2.0

debug1: Local version string SSH-2.0-OpenSSH_7.1

debug2: fd 4 setting O_NONBLOCK

debug2: fd 5 setting O_NONBLOCK

debug1: list_hostkey_types: ssh-rsa,ssh-ed25519

debug1: SSH2_MSG_KEXINIT sent

debug1: SSH2_MSG_KEXINIT received

debug2: kex_parse_kexinit:
curve25519-***@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2
-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1

debug2: kex_parse_kexinit: ssh-rsa,ssh-ed25519

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: none,***@openssh.com

debug2: kex_parse_kexinit: none,***@openssh.com

debug2: kex_parse_kexinit:

debug2: kex_parse_kexinit:

debug2: first_kex_follows 0

debug2: reserved 0

debug2: kex_parse_kexinit:
diffie-hellman-group14-sha1,diffie-hellman-group1-sha1

debug2: kex_parse_kexinit:
ssh-ed25519-cert-***@openssh.com,ssh-rsa-cert-***@openssh.com,ssh-ed25519,ss
h-rsa,ecdsa-sha2-nistp256-cert-***@openssh.com,ecdsa-sha2-nistp384-cert-v01@
openssh.com,ecdsa-sha2-nistp521-cert-***@openssh.com,ecdsa-sha2-nistp256,ecd
sa-sha2-nistp384,ecdsa-sha2-nistp521

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: none,***@openssh.com,zlib

debug2: kex_parse_kexinit: none,***@openssh.com,zlib

debug2: kex_parse_kexinit:

debug2: kex_parse_kexinit:

debug2: first_kex_follows 0

debug2: reserved 0

debug1: kex: client->server aes128-ctr hmac-sha1 none

debug1: kex: server->client aes128-ctr hmac-sha1 none

debug2: bits set: 1045/2048

debug1: expecting SSH2_MSG_KEXDH_INIT

debug2: bits set: 1044/2048

FATAL:

FAIL:





***************** regress.log ************



trace: test integrity: hmac-sha1 @2905

FATAL:

FAIL:



***************** ssh.log ************



trace: test integrity: hmac-sha1 @2905

debug1: Executing proxy command: exec sh
/home/git/openssh-portable/regress/sshd-log-wrapper.sh
/home/git/openssh-portable/regress/sshd.log /home/git/openssh-portable/sshd
-i -f /home/git/openssh-portable/regress/sshd_proxy |
/home/git/openssh-portable/regress/modpipe -wm xor:2905:1

debug1: permanently_drop_suid: 65535

debug1: identity file /home/git/openssh-portable/regress/rsa type 1

debug1: key_load_public: No such file or directory

debug1: identity file /home/git/openssh-portable/regress/rsa-cert type -1

debug1: identity file /home/git/openssh-portable/regress/ed25519 type 4

debug1: key_load_public: No such file or directory

debug1: identity file /home/git/openssh-portable/regress/ed25519-cert type
-1

debug1: Enabling compatibility mode for protocol 2.0

debug1: Local version string SSH-2.0-OpenSSH_7.1

debug1: Remote protocol version 2.0, remote software version OpenSSH_7.1

debug1: match: OpenSSH_7.1 pat OpenSSH* compat 0x04000000

debug2: fd 6 setting O_NONBLOCK

debug2: fd 5 setting O_NONBLOCK

debug1: Authenticating to 127.0.0.1:4242 as 'SUPER.SUPER'

debug1: using hostkeyalias: localhost-with-alias

debug3: hostkeys_foreach: reading file
"/home/git/openssh-portable/regress/known_hosts"

debug3: record_hostkey: found key type RSA in file
/home/git/openssh-portable/regress/known_hosts:1

debug3: record_hostkey: found key type ED25519 in file
/home/git/openssh-portable/regress/known_hosts:2

debug3: load_hostkeys: loaded 2 keys from localhost-with-alias

debug3: hostkeys_foreach: reading file
"/home/git/openssh-portable/regress/known_hosts"

debug3: record_hostkey: found key type RSA in file
/home/git/openssh-portable/regress/known_hosts:1

debug3: record_hostkey: found key type ED25519 in file
/home/git/openssh-portable/regress/known_hosts:2

debug3: load_hostkeys: loaded 2 keys from localhost-with-alias

debug3: order_hostkeyalgs: prefer hostkeyalgs:
ssh-ed25519-cert-***@openssh.com,ssh-rsa-cert-***@openssh.com,ssh-ed25519,ss
h-rsa

debug1: SSH2_MSG_KEXINIT sent

debug1: SSH2_MSG_KEXINIT received

debug2: kex_parse_kexinit:
diffie-hellman-group14-sha1,diffie-hellman-group1-sha1

debug2: kex_parse_kexinit:
ssh-ed25519-cert-***@openssh.com,ssh-rsa-cert-***@openssh.com,ssh-ed25519,ss
h-rsa,ecdsa-sha2-nistp256-cert-***@openssh.com,ecdsa-sha2-nistp384-cert-v01@
openssh.com,ecdsa-sha2-nistp521-cert-***@openssh.com,ecdsa-sha2-nistp256,ecd
sa-sha2-nistp384,ecdsa-sha2-nistp521

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: none,***@openssh.com,zlib

debug2: kex_parse_kexinit: none,***@openssh.com,zlib

debug2: kex_parse_kexinit:

debug2: kex_parse_kexinit:

debug2: first_kex_follows 0

debug2: reserved 0

debug2: kex_parse_kexinit:
curve25519-***@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2
-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1

debug2: kex_parse_kexinit: ssh-rsa,ssh-ed25519

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: none,***@openssh.com

debug2: kex_parse_kexinit: none,***@openssh.com

debug2: kex_parse_kexinit:

debug2: kex_parse_kexinit:

debug2: first_kex_follows 0

debug2: reserved 0

debug1: kex: server->client aes128-ctr hmac-sha1 none

debug1: kex: client->server aes128-ctr hmac-sha1 none

debug1: sending SSH2_MSG_KEXDH_INIT

debug2: bits set: 1044/2048

debug1: expecting SSH2_MSG_KEXDH_REPLY

FATAL:

FAIL:



***************** sshd.log ************



trace: test integrity: hmac-sha1 @2905

debug1: inetd sockets after dupping: 4, 5

Connection from UNKNOWN port 65535 on UNKNOWN port 65535

debug1: Client protocol version 2.0; client software version OpenSSH_7.1

debug1: match: OpenSSH_7.1 pat OpenSSH* compat 0x04000000

debug1: Enabling compatibility mode for protocol 2.0

debug1: Local version string SSH-2.0-OpenSSH_7.1

debug2: fd 4 setting O_NONBLOCK

debug2: fd 5 setting O_NONBLOCK

debug1: list_hostkey_types: ssh-rsa,ssh-ed25519

debug1: SSH2_MSG_KEXINIT sent

debug1: SSH2_MSG_KEXINIT received

debug2: kex_parse_kexinit:
curve25519-***@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2
-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1

debug2: kex_parse_kexinit: ssh-rsa,ssh-ed25519

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: none,***@openssh.com

debug2: kex_parse_kexinit: none,***@openssh.com

debug2: kex_parse_kexinit:

debug2: kex_parse_kexinit:

debug2: first_kex_follows 0

debug2: reserved 0

debug2: kex_parse_kexinit:
diffie-hellman-group14-sha1,diffie-hellman-group1-sha1

debug2: kex_parse_kexinit:
ssh-ed25519-cert-***@openssh.com,ssh-rsa-cert-***@openssh.com,ssh-ed25519,ss
h-rsa,ecdsa-sha2-nistp256-cert-***@openssh.com,ecdsa-sha2-nistp384-cert-v01@
openssh.com,ecdsa-sha2-nistp521-cert-***@openssh.com,ecdsa-sha2-nistp256,ecd
sa-sha2-nistp384,ecdsa-sha2-nistp521

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: aes128-ctr

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: hmac-sha1

debug2: kex_parse_kexinit: none,***@openssh.com,zlib

debug2: kex_parse_kexinit: none,***@openssh.com,zlib

debug2: kex_parse_kexinit:

debug2: kex_parse_kexinit:

debug2: first_kex_follows 0

debug2: reserved 0

debug1: kex: client->server aes128-ctr hmac-sha1 none

debug1: kex: server->client aes128-ctr hmac-sha1 none

debug2: bits set: 1045/2048

debug1: expecting SSH2_MSG_KEXDH_INIT

debug2: bits set: 1044/2048



-- Brief whoami: NonStop&UNIX developer since approximately
UNIX(421664400)/NonStop(211288444200000000)

-- In my real life, I talk too much.
Darren Tucker
2016-02-10 02:30:23 UTC
Permalink
On Wed, Feb 10, 2016 at 10:41 AM, Randall S. Becker
Post by Randall S. Becker
Thread split from my previous communication. Here is the integrity logs on
the platform. I had to cut this should due to the length of the logs (5Mb).
This one looks odd. The ssh session itself looks OK: it authenticates
then sends a
printf shell command (basically, just a way of guaranteeing a minimum amount
Post by Randall S. Becker
debug1: Sending command: printf "%4096s" " "
The session then closes OK but ssh exists with a -1 error code, which
gets propagated
back up the stack as a failure.
Post by Randall S. Becker
debug1: Exit status -1
Exit statuses in POSIX should be 0-255. We can see in the sshd.log
that the server
sent an exit status (session_exit_message), so either your printf
command/builtin
returns a bogus exit code, or ssh is mishandling it.

What's the return code of printf? ie:

printf "%4096s" " "; echo $?
--
Darren Tucker (dtucker at zip.com.au)
GPG key 8FF4FA69 / D9A3 86E9 7EEE AF4B B2D4 37C9 C982 80C7 8FF4 FA69
Good judgement comes with experience. Unfortunately, the experience
usually comes from bad judgement.
Randall S. Becker
2016-02-10 15:22:36 UTC
Permalink
Subject: Re: Test Failure OpenSSH 7.1 P2 on HPE NSE for integrity
[...]
This one looks odd. The ssh session itself looks OK: it authenticates then
sends a printf shell command (basically, just a way of guaranteeing a
Post by Randall S. Becker
debug1: Sending command: printf "%4096s" " "
The session then closes OK but ssh exists with a -1 error code, which gets
propagated back up the stack as a failure.
Post by Randall S. Becker
debug1: Exit status -1
Exit statuses in POSIX should be 0-255. We can see in the sshd.log that the
server sent an exit status (session_exit_message), so either your printf
command/builtin returns a bogus exit code, or ssh is mishandling it.
printf "%4096s" " "; echo $?
Dumps 4K of blanks. Exit code reports 0, as expected. Tried in bash and ksh. Is there a missing return buried that ssh is pulling a non-zero off the stack somewhere?
Randall S. Becker
2016-02-11 22:25:59 UTC
Permalink
[...]
Post by Darren Tucker
This one looks odd. The ssh session itself looks OK: it authenticates
then sends a printf shell command (basically, just a way of
Post by Randall S. Becker
debug1: Sending command: printf "%4096s" " "
The session then closes OK but ssh exists with a -1 error code, which
gets propagated back up the stack as a failure.
Post by Randall S. Becker
debug1: Exit status -1
I put in a couple of debug statements in clientloop.c where exit_status is
set. It looks like the initialization of exit_status = -1 is the only point
where the value is modified. I'm trying to figure out how the while can exit
without exit_status being modified. Can you shed some light on that? The
neither of the packet_get_int() calls that set exit_status (approx. near
1790 and 2091) are being invoked. Modpipe seems happy enough, with the read
and write calls working and internal aborts.

Cheers,
Randall
Darren Tucker
2016-02-12 00:12:05 UTC
Permalink
On Fri, Feb 12, 2016 at 9:25 AM, Randall S. Becker
Post by Randall S. Becker
[...]
Post by Darren Tucker
This one looks odd. The ssh session itself looks OK: it authenticates
then sends a printf shell command (basically, just a way of
Post by Randall S. Becker
debug1: Sending command: printf "%4096s" " "
The session then closes OK but ssh exists with a -1 error code, which
gets propagated back up the stack as a failure.
Post by Randall S. Becker
debug1: Exit status -1
I put in a couple of debug statements in clientloop.c where exit_status is
set. It looks like the initialization of exit_status = -1 is the only point
where the value is modified.
Looking closer at the sshd log:

debug1: client_input_channel_req: channel 0 rtype exit-signal reply 0

The code for this is in session_exit_message() and looks like:

if (WIFEXITED(status)) {
channel_request_start(s->chanid, "exit-status", 0);
packet_put_int(WEXITSTATUS(status));
packet_send();
} else if (WIFSIGNALED(status)) {
channel_request_start(s->chanid, "exit-signal", 0);

so your printf is probably dying with a signal rather than exiting.
Which signal? dunno, but my guess would be SIGPIPE. Try adding
something like this to the top of session_exit_message():

debug3("%s: status: %d", __func__, status);
Post by Randall S. Becker
I'm trying to figure out how the while can exit
without exit_status being modified. Can you shed some light on that?
if the server never sends an "exit-status" packet (as opposed to an
"exit-signal" packet, which it does send) then the exit-status code in
client_input_channel_req() will never get called and exit_status will
remain -1 since that's what it's initialized to.
--
Darren Tucker (dtucker at zip.com.au)
GPG key 8FF4FA69 / D9A3 86E9 7EEE AF4B B2D4 37C9 C982 80C7 8FF4 FA69
Good judgement comes with experience. Unfortunately, the experience
usually comes from bad judgement.
Loading...