On Apr 2, 8:31 pm, lyn...@orthanc.ca (Lyndon Nerenberg) wrote:
> On 2012-04-02, at 7:27 PM, Lyndon Nerenberg wrote:
>
> > I haven't tried genning up a CPU kernel with the new factotum yet.
>
> Sorry, I meant to say "with Richard's patched original factotum."

I haven't tried building a new pccpuf kernel yet either, but on
rebooting with factotum and ssh binaries built from  from blstuart/ssh
and on miller/factotum I get to "auth Authentication failed"

I am not sure if there is something else I have configured wrong, any
thoughts/suggestions/other debugging tools?

Here is some output from acid -l truss on my plan9 client, and the
sshd -d logs from my gentoo sshd host


/*acid -l truss /bin/ssh */
acid: new()
acid: truss()
fd2path(0, 0xdfffdeb0, 64)
        return value: 0
        data: "/dev/cons"
brk_(0x0000fd60)
        return value: 0
stat("/net/ssh", 0x0000ede4, 115)
        return value: -1
rfork(0x00000038)
        return value: 7629
await(0xdfffdcec, 511, 511)
        return value: 38
        data: "7629 0 10 10 'sshtun 7629: threadmain'"
rfork(0x00000074)
        return value: 7632
notify(0x0000405c)
        return value: 0
open("/net/cs", 2)
        return value: 4
pwrite(4, "ssh!192.168.1.10!22", 19, 4294967295)
        return value: 19
seek(0x0000e754, 4, 0, 0)
        return value: 0
pread(4, 0xdfffdcb0, 127, 4294967295)
        return value: 30
        data: "/net/ssh/clone 192.168.1.10!22"
open("/net/ssh/clone", 2)
        return value: 7
pread(7, 0xdfffd880, 255, 4294967295)
        return value: 1
        data: "0"
pwrite(7, "connect 192.168.1.10!22", 23, 4294967295)
        return value: 23
open("/net/ssh/0/data", 2)
        return value: 10
close(4)
        return value: 0
errstr(0xdfffda08, 128, 128)
        return value: 0
        data: "'/net/ssh' dns: file does not exist"
seek(0x0000e754, 7, 0, 0)
        return value: 0
pread(7, 0xdfffdf1c, 10, 4294967295)
        return value: 1
        data: "0"
open("/dev/cons", 2)
        return value: 4
open("/dev/consctl", 1)
        return value: 11
pwrite(11, "rawon", 5, 4294967295)
        return value: 5
pwrite(7, "ssh-userauth K rhoyerboat", 18, 4294967295)
        return value: -1
open("/mnt/factotum/rpc", 2)
        return value: 12
brk_(0x00011de8)
        return value: 0
pwrite(12, "start proto=pass service=ssh server=192.168.1.10
user=rhoyerboat", 57, 4294967295)
        return value: 57
pread(12, 0x0000ed6c, 4096, 4294967295)
        return value: 2
        data: "ok"
pwrite(12, "read ", 5, 4294967295)
        return value: 5
pread(12, 0x0000ed6c, 4096, 4294967295)
        return value: 21
        data: "ok rhoyerboat XXXX12345"
close(12)
        return value: 0
pwrite(7, "ssh-userauth k rhoyerboat XXXX12345", 33, 4294967295)
        return value: -1
errstr(0xdfffdbe0, 128, 128)
        return value: 0
        data: "Authentication failed"
errstr(0xdfffdbe0, 128, 128)
        return value: 0
        data: "(null)"
pwrite(2, "auth Authentication failed
", 27, 4294967295)
auth Authentication failed
        return value: 27
pwrite(11, "rawoff", 6, 4294967295)
        return value: 6
close(11)
        return value: 0
close(4)
        return value: 0
pwrite(0, "close", 5, 4294967295)
        return value: -1
close(0)
        return value: 0
close(0)
        return value: -1
close(10)
        return value: 0
close(0)
        return value: -1
close(7)
        return value: 0
pwrite(0, "kill", 4, 4294967295)
        return value: -1
close(0)
        return value: -1
open("#c/pid", 0)
        return value: 0
pread(0, 0xdfffdec0, 20, 4294967295)
        return value: 12
        data: "       7628 "
close(0)
        return value: 0
7628: breakpoint        _exits+0x5      INTB    $0x40


/* sshd -d logs */

Connection from 192.168.1.9 port 41598
debug1: HPN Disabled: 0, HPN Buffer Size: 87380
debug1: Client protocol version 2.0; client software version Plan9
SSH: Server;Ltype: Version;Remote: 192.168.1.9-41598;Protocol:
2.0;Client: Plan9
debug1: no match: Plan9
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_5.8p1-hpn13v10
debug1: permanently_set_uid: 22/22
debug1: MYFLAG IS 1
debug1: list_hostkey_types: ssh-rsa,ssh-dss,ecdsa-sha2-nistp256
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug1: AUTH STATE IS 0
debug1: REQUESTED ENC.NAME is 'aes128-cbc'
debug1: kex: client->server aes128-cbc hmac-sha1 none
SSH: Server;Ltype: Kex;Remote: 192.168.1.9-41598;Enc: aes128-cbc;MAC:
hmac-sha1;Comp: none
debug1: REQUESTED ENC.NAME is 'aes128-cbc'
debug1: kex: server->client aes128-cbc hmac-sha1 none
debug1: expecting SSH2_MSG_KEXDH_INIT
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug1: SSH2_MSG_NEWKEYS received
debug1: KEX done
debug1: userauth-request for user rhoyerboat service ssh-connection
method password
SSH: Server;Ltype: Authname;Remote: 192.168.1.9-41598;Name: rhoyerboat
debug1: attempt 0 failures 0
debug1: Config token is loglevel
debug1: Config token is permitrootlogin
debug1: Config token is rsaauthentication
debug1: Config token is pubkeyauthentication
debug1: Config token is authorizedkeysfile
debug1: Config token is passwordauthentication
debug1: Config token is usepam
debug1: Config token is printmotd
debug1: Config token is printlastlog
debug1: Config token is subsystem
debug1: PAM: initializing for rhoyerboat
debug1: PAM: setting PAM_RHOST to 192.168.1.9
debug1: PAM: setting PAM_TTY to ssh
Read from socket failed: Connection reset by peer
debug1: do_cleanup
debug1: do_cleanup
debug1: PAM: cleanup

Reply via email to