Thanks.  The strace is indeed useful, although it doesn't get us all the
way there.  This is very strange!  It appears that the network monitor
is attempting to create a Unix socket in the middle of sending a
USERAUTH_SUCCESS packet, which is peculiar to say the least.

This may take a few iterations.  Could you please revert your changes to
sandbox-seccomp-filter.c, and instead apply the attached patch?  You can
apply it with "patch -p1 </path/to/sshd-debug.patch", and then repeat
exactly what you did before to build and install it; I then only need
the strace, generated using the same procedure as before.  What I'm
trying to do here is to narrow down exactly where sshd is heading off to
try to create a socket.

** Patch added: "sshd-debug.patch"
   
https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/1690485/+attachment/4996722/+files/sshd-debug.patch

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1690485

Title:
  openssh-server SIGSYS with 'UsePrivilegeSeparation sandbox'

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/1690485/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to