Mailing List Archive

Announce: openssh-2.0.0beta1
For the last couple of months, the OpenBSD team has been working hard
to implement the SSH2 protocol in OpenSSH. The SSH2 protcol offers a
number of advantages over the SSH1 protocol including standards
compliance (SSH2 is on the IETF standards track), improved security and
operation without RSA (which is patented in some countries).

This release of the portable version incorporates this work and adds
inbuilt entropy collection for Unices which lack a kernel random
number pool.

Since there is a lot of new and changed code, we are keen to gather
feedback from users of the new features. In particular:

- SSH2. Please read README.openssh2 and add "Protocol 2,1" to
your sshd_config and ssh_config.

- Entropy collection. There is little documentation on this so far.
If your system lacks both a kernel random pool and EGD, a file
ssh_prng_cmds will be created. This file contains the commands
which will be used to seed the random number generator. We are
interested in additional commands and refinements to the current
set. Please send in the output of "ssh -v", which includes the
amounts of entropy gathered.

The beta release is available from
http://violet.ibs.com.au/openssh/files/beta

Note that this release _requires_ OpenSSL 0.9.5 or greater.

Regards,
Damien Miller

--
| "Bombay is 250ms from New York in the new world order" - Alan Cox
| Damien Miller - http://www.mindrot.org/
| Email: djm@mindrot.org (home) -or- djm@ibs.com.au (work)
Re: Announce: openssh-2.0.0beta1 [ In reply to ]
Damien Miller wrote:

> The beta release is available from
> http://violet.ibs.com.au/openssh/files/beta
>
> Note that this release _requires_ OpenSSL 0.9.5 or greater.

Thank you for the great openssh package.
I have downloaded and began testing the beta.
A few things I noticed.

- For unknown reasons, I failed to ftp the .sig file for beta from au
site.
(Strange. Maybe this is my peculiar netscape bug or something. YMMV.)

- The use of atomicio for read/write that saved the people
who experienced scp failures is not reflected in scp.c, it seems.
read() calls are not wrapped in atomicio at all.
Most of write() calls except two are wrapped in atomicio.

Happy Hacking,

Ishikawa
Re: Announce: openssh-2.0.0beta1 [ In reply to ]
>Note that this release _requires_ OpenSSL 0.9.5 or greater.

If so, then the configure script should be changed to eliminate
references to SSLeay, especially the message

checking for OpenSSL/SSLeay directory ...

When I had the problem I reported the other day in finding openssl, I
was initially confused by this message because I had SSLeay but not
OpenSSL already installed on my system.

Phil
Re: Announce: openssh-2.0.0beta1 [ In reply to ]
Yo Damien!

Hooray! All it took to build on UnixWare 7.1.0 was:
./configure && make && make install

I also edited the ssh*_config files as required.

All the old stuff works fine so far and no more EGD!

opensshd:

I was unable to connect to the new sshd with SecureCRT Ver 3.0. If:

I connect from that with 3DES or RC4 I get:
"disconnect, reason code: 2" ??

If I connect from that with twofish, it says:
"no compatible ciphers".

Blowfish is not a SecureCRT option with SSH2.

Similar results connecting from ssh 2.0.13 on Linux to opensshd

ossh:

openssh was able to connect out to ssh ver 2.0.13.

On Tue, 2 May 2000, Damien Miller wrote:

> The beta release is available from
> http://violet.ibs.com.au/openssh/files/beta

RGDS
GARY
---------------------------------------------------------------------------
Gary E. Miller Rellim 20340 Empire Ave, Suite E-3, Bend, OR 97701
gem@rellim.com Tel:+1(541)382-8588 Fax: +1(541)382-8676
Re: Announce: openssh-2.0.0beta1 [ In reply to ]
Yo Damien!

Ooops, I forgot to say that ssh1 protol work fine, I only had problems
with the ssh2 protocol inbound.

RGDS
GARY

On Tue, 2 May 2000, Gary E. Miller wrote:

> I was unable to connect to the new sshd with SecureCRT Ver 3.0. If:
[...]

---------------------------------------------------------------------------
Gary E. Miller Rellim 20340 Empire Ave, Suite E-3, Bend, OR 97701
gem@rellim.com Tel:+1(541)382-8588 Fax: +1(541)382-8676
Re: Announce: openssh-2.0.0beta1 [ In reply to ]
Could you please provide the debugging output from the sshd? e.g.,
start with
# sshd -d -p 2222
I used SecureCRT while adding my SSH2 support to OpenSSH and it did
work fine (3des and rc4). Also, make sure you select "Standard"
instead of datafellows server.

-markus

On Tue, May 02, 2000 at 05:20:28PM -0700, Gary E. Miller wrote:
> Yo Damien!
>
> Hooray! All it took to build on UnixWare 7.1.0 was:
> ./configure && make && make install
>
> I also edited the ssh*_config files as required.
>
> All the old stuff works fine so far and no more EGD!
>
> opensshd:
>
> I was unable to connect to the new sshd with SecureCRT Ver 3.0. If:
>
> I connect from that with 3DES or RC4 I get:
> "disconnect, reason code: 2" ??
>
> If I connect from that with twofish, it says:
> "no compatible ciphers".
>
> Blowfish is not a SecureCRT option with SSH2.
>
> Similar results connecting from ssh 2.0.13 on Linux to opensshd
>
> ossh:
>
> openssh was able to connect out to ssh ver 2.0.13.
>
> On Tue, 2 May 2000, Damien Miller wrote:
>
> > The beta release is available from
> > http://violet.ibs.com.au/openssh/files/beta
>
> RGDS
> GARY
> ---------------------------------------------------------------------------
> Gary E. Miller Rellim 20340 Empire Ave, Suite E-3, Bend, OR 97701
> gem@rellim.com Tel:+1(541)382-8588 Fax: +1(541)382-8676
>
>
Re: Announce: openssh-2.0.0beta1 [ In reply to ]
Yo Markus!

I tried setting SecureCRT to "standard" from "datafellows". Now it connects,
I get a password prompt and I get disconnected. Nothing in the logs except
that sshd accepted my ssh2 connection.

I will try the debug stuff on Thursdayy.

I also get a LOT of these:

May 3 22:23:51 demo sshd[16252]: error: Couldn't wait for child '/usr/bin/uptime ' completion: Interrupted system call
May 3 22:23:51 demo sshd[16252]: error: Couldn't wait for child '/usr/bin/ipcs -a' completion: Interrupted system call

The commands are (mostly) OK, so any ideas?

RGDS
GARY

On Wed, 3 May 2000, Markus Friedl wrote:

> Could you please provide the debugging output from the sshd? e.g.,
> start with
> # sshd -d -p 2222
> I used SecureCRT while adding my SSH2 support to OpenSSH and it did
> work fine (3des and rc4). Also, make sure you select "Standard"
> instead of datafellows server.
>
> -markus
>
> On Tue, May 02, 2000 at 05:20:28PM -0700, Gary E. Miller wrote:
> > Yo Damien!
> >
> > Hooray! All it took to build on UnixWare 7.1.0 was:
> > ./configure && make && make install
> >
> > I also edited the ssh*_config files as required.
> >
> > All the old stuff works fine so far and no more EGD!
> >
> > opensshd:
> >
> > I was unable to connect to the new sshd with SecureCRT Ver 3.0. If:
> >
> > I connect from that with 3DES or RC4 I get:
> > "disconnect, reason code: 2" ??
> >
> > If I connect from that with twofish, it says:
> > "no compatible ciphers".
> >
> > Blowfish is not a SecureCRT option with SSH2.
> >
> > Similar results connecting from ssh 2.0.13 on Linux to opensshd
> >
> > ossh:
> >
> > openssh was able to connect out to ssh ver 2.0.13.
> >
> > On Tue, 2 May 2000, Damien Miller wrote:
> >
> > > The beta release is available from
> > > http://violet.ibs.com.au/openssh/files/beta
> >
> > RGDS
> > GARY
> > ---------------------------------------------------------------------------
> > Gary E. Miller Rellim 20340 Empire Ave, Suite E-3, Bend, OR 97701
> > gem@rellim.com Tel:+1(541)382-8588 Fax: +1(541)382-8676
> >
> >
>

---------------------------------------------------------------------------
Gary E. Miller Rellim 20340 Empire Ave, Suite E-3, Bend, OR 97701
gem@rellim.com Tel:+1(541)382-8588 Fax: +1(541)382-8676
Re: Announce: openssh-2.0.0beta1 [ In reply to ]
Yo Markus!

On Wed, 3 May 2000, Markus Friedl wrote:

> Could you please provide the debugging output from the sshd? e.g.,
> start with
> # sshd -d -p 2222
> I used SecureCRT while adding my SSH2 support to OpenSSH and it did
> work fine (3des and rc4). Also, make sure you select "Standard"
> instead of datafellows server.

Here is what I get when I run openssh sshd ver 2.0.0.beta1 on
Unixware7 and then connect from a SecureCRT client ver 3.0
set to "standard", 3DES and ssh2.

bash-2.03# /usr/local/sbin/sshd -d > ssh.log 2>&1
Segmentation Fault

The ssh.log is after my sig.

RGDS
GARY
---------------------------------------------------------------------------
Gary E. Miller Rellim 20340 Empire Ave, Suite E-3, Bend, OR 97701
gem@rellim.com Tel:+1(541)382-8588 Fax: +1(541)382-8676

debug: sshd version OpenSSH-2.0
debug: loaded 29 entropy commands from /usr/local/etc/ssh_prng_cmds
debug: Seeding random number generator.
debug: OpenSSL random status is now 0

debug: 3 bytes from system calls
debug: Exit status was 2
debug: Got 0.00 bytes of entropy from /usr/bin/ls
debug: Got 0.39 bytes of entropy from /usr/bin/ls
debug: Got 0.33 bytes of entropy from /usr/bin/ls
debug: Got 0.02 bytes of entropy from /usr/bin/ls
debug: Got 1.73 bytes of entropy from /usr/bin/ls
debug: Got 0.14 bytes of entropy from /usr/bin/ls
debug: Got 2.00 bytes of entropy from /usr/bin/netstat
debug: Got 0.38 bytes of entropy from /usr/bin/netstat
debug: Got 0.11 bytes of entropy from /usr/bin/netstat
debug: Got 0.73 bytes of entropy from /usr/bin/netstat
debug: Got 0.12 bytes of entropy from /usr/sbin/arp
debug: Got 0.11 bytes of entropy from /usr/sbin/ifconfig
debug: Exit status was 1
debug: Got 0.00 bytes of entropy from /sbin/ps
debug: Got 0.51 bytes of entropy from /sbin/ps
debug: Got 2.00 bytes of entropy from /sbin/ps
debug: Got 0.14 bytes of entropy from /usr/bin/w
debug: Exit status was 1
debug: Got 0.00 bytes of entropy from /sbin/who
debug: Got 0.13 bytes of entropy from /usr/bin/last
debug: Got 0.82 bytes of entropy from /sbin/df
debug: Got 0.81 bytes of entropy from /sbin/df
debug: Got 0.00 bytes of entropy from /usr/bin/uptime
debug: Got 0.07 bytes of entropy from /usr/bin/ipcs
debug: Exit status was 2
debug: Got 0.00 bytes of entropy from /usr/bin/tail
debug: Exit status was 2
debug: Got 0.00 bytes of entropy from /usr/bin/tail
debug: Exit status was 2
debug: Got 0.00 bytes of entropy from /usr/bin/tail
debug: Got 2.00 bytes of entropy from /usr/bin/tail
debug: Exit status was 2
debug: Got 0.00 bytes of entropy from /usr/bin/tail
debug: Exit status was 2
debug: Got 0.00 bytes of entropy from /usr/bin/tail
debug: Exit status was 2
debug: Got 0.00 bytes of entropy from /usr/bin/tail
debug: Command '/usr/bin/ls -alni /var/log' disabled (badness 128)
debug: Got 0.19 bytes of entropy from /usr/bin/ls
debug: Got 0.17 bytes of entropy from /usr/bin/ls
debug: Got 0.01 bytes of entropy from /usr/bin/ls
debug: Got 0.87 bytes of entropy from /usr/bin/ls
debug: Got 0.07 bytes of entropy from /usr/bin/ls
debug: Got 1.00 bytes of entropy from /usr/bin/netstat
debug: Got 0.19 bytes of entropy from /usr/bin/netstat
debug: Got 0.05 bytes of entropy from /usr/bin/netstat
debug: Got 0.36 bytes of entropy from /usr/bin/netstat
debug: Got 0.06 bytes of entropy from /usr/sbin/arp
debug: Got 0.06 bytes of entropy from /usr/sbin/ifconfig
debug: Command '/sbin/ps laxww ' disabled (badness 128)
debug: Got 0.26 bytes of entropy from /sbin/ps
debug: Got 1.00 bytes of entropy from /sbin/ps
debug: Got 0.07 bytes of entropy from /usr/bin/w
debug: Command '/sbin/who -i ' disabled (badness 128)
debug: Got 0.06 bytes of entropy from /usr/bin/last
debug: Got 0.41 bytes of entropy from /sbin/df
debug: Got 0.40 bytes of entropy from /sbin/df
debug: Got 0.00 bytes of entropy from /usr/bin/uptime
debug: Got 0.04 bytes of entropy from /usr/bin/ipcs
debug: Command '/usr/bin/tail -200 /var/log/messages' disabled (badness 128)
debug: Command '/usr/bin/tail -200 /var/log/syslog' disabled (badness 128)
debug: Command '/usr/bin/tail -200 /var/adm/messages' disabled (badness 128)
debug: Got 1.00 bytes of entropy from /usr/bin/tail
debug: Command '/usr/bin/tail -200 /var/adm/syslog/syslog.log' disabled (badness 128)
debug: Command '/usr/bin/tail -200 /var/log/maillog' disabled (badness 128)
debug: Command '/usr/bin/tail -200 /var/adm/maillog' disabled (badness 128)
debug: 33 bytes from programs
debug: OpenSSL random status is now 1

debug: loading PRNG seed from file /root/.ssh/prng_seed
debug: read DSA private key done
debug: Seeding random number generator.
debug: OpenSSL random status is now 1

debug: 3 bytes from system calls
debug: Command '/usr/bin/ls -alni /var/log' disabled (badness 127)
debug: Got 0.39 bytes of entropy from /usr/bin/ls
debug: Got 0.33 bytes of entropy from /usr/bin/ls
debug: Got 0.02 bytes of entropy from /usr/bin/ls
debug: Got 1.73 bytes of entropy from /usr/bin/ls
debug: Got 0.14 bytes of entropy from /usr/bin/ls
debug: Got 2.00 bytes of entropy from /usr/bin/netstat
debug: Got 0.38 bytes of entropy from /usr/bin/netstat
debug: Got 0.11 bytes of entropy from /usr/bin/netstat
debug: Got 0.73 bytes of entropy from /usr/bin/netstat
debug: Got 0.12 bytes of entropy from /usr/sbin/arp
debug: Got 0.11 bytes of entropy from /usr/sbin/ifconfig
debug: Command '/sbin/ps laxww ' disabled (badness 127)
debug: Got 0.51 bytes of entropy from /sbin/ps
debug: Got 2.00 bytes of entropy from /sbin/ps
debug: Got 0.14 bytes of entropy from /usr/bin/w
debug: Command '/sbin/who -i ' disabled (badness 127)
debug: Got 0.13 bytes of entropy from /usr/bin/last
debug: Got 0.82 bytes of entropy from /sbin/df
debug: Got 0.81 bytes of entropy from /sbin/df
debug: Got 0.00 bytes of entropy from /usr/bin/uptime
debug: Got 0.07 bytes of entropy from /usr/bin/ipcs
debug: Command '/usr/bin/tail -200 /var/log/messages' disabled (badness 127)
debug: Command '/usr/bin/tail -200 /var/log/syslog' disabled (badness 127)
debug: Command '/usr/bin/tail -200 /var/adm/messages' disabled (badness 127)
debug: Got 2.00 bytes of entropy from /usr/bin/tail
debug: Command '/usr/bin/tail -200 /var/adm/syslog/syslog.log' disabled (badness 127)
debug: Command '/usr/bin/tail -200 /var/log/maillog' disabled (badness 127)
debug: Command '/usr/bin/tail -200 /var/adm/maillog' disabled (badness 127)
debug: Command '/usr/bin/ls -alni /var/log' disabled (badness 126)
debug: Got 0.19 bytes of entropy from /usr/bin/ls
debug: Got 0.17 bytes of entropy from /usr/bin/ls
debug: Got 0.01 bytes of entropy from /usr/bin/ls
debug: Got 0.87 bytes of entropy from /usr/bin/ls
debug: Got 0.07 bytes of entropy from /usr/bin/ls
debug: Got 1.00 bytes of entropy from /usr/bin/netstat
debug: Got 0.19 bytes of entropy from /usr/bin/netstat
debug: Got 0.05 bytes of entropy from /usr/bin/netstat
debug: Got 0.36 bytes of entropy from /usr/bin/netstat
debug: Got 0.06 bytes of entropy from /usr/sbin/arp
debug: Got 0.06 bytes of entropy from /usr/sbin/ifconfig
debug: Command '/sbin/ps laxww ' disabled (badness 126)
debug: Got 0.26 bytes of entropy from /sbin/ps
debug: Got 1.00 bytes of entropy from /sbin/ps
debug: Got 0.07 bytes of entropy from /usr/bin/w
debug: Command '/sbin/who -i ' disabled (badness 126)
debug: Got 0.06 bytes of entropy from /usr/bin/last
debug: Got 0.41 bytes of entropy from /sbin/df
debug: Got 0.40 bytes of entropy from /sbin/df
debug: Got 0.00 bytes of entropy from /usr/bin/uptime
debug: Got 0.04 bytes of entropy from /usr/bin/ipcs
debug: Command '/usr/bin/tail -200 /var/log/messages' disabled (badness 126)
debug: Command '/usr/bin/tail -200 /var/log/syslog' disabled (badness 126)
debug: Command '/usr/bin/tail -200 /var/adm/messages' disabled (badness 126)
debug: Got 1.00 bytes of entropy from /usr/bin/tail
debug: Command '/usr/bin/tail -200 /var/adm/syslog/syslog.log' disabled (badness 126)
debug: Command '/usr/bin/tail -200 /var/log/maillog' disabled (badness 126)
debug: Command '/usr/bin/tail -200 /var/adm/maillog' disabled (badness 126)
debug: 30 bytes from programs
debug: OpenSSL random status is now 1

debug: Bind to port 22 on 0.0.0.0.
Server listening on 0.0.0.0 port 22.
Generating 768 bit RSA key.
debug: Seeding random number generator.
debug: OpenSSL random status is now 1

debug: 3 bytes from system calls
debug: Command '/usr/bin/ls -alni /var/log' disabled (badness 125)
debug: Got 0.39 bytes of entropy from /usr/bin/ls
debug: Got 0.33 bytes of entropy from /usr/bin/ls
debug: Got 0.02 bytes of entropy from /usr/bin/ls
debug: Got 1.73 bytes of entropy from /usr/bin/ls
debug: Got 0.14 bytes of entropy from /usr/bin/ls
debug: Got 2.00 bytes of entropy from /usr/bin/netstat
debug: Got 0.38 bytes of entropy from /usr/bin/netstat
debug: Got 0.11 bytes of entropy from /usr/bin/netstat
debug: Got 0.73 bytes of entropy from /usr/bin/netstat
debug: Got 0.12 bytes of entropy from /usr/sbin/arp
debug: Got 0.11 bytes of entropy from /usr/sbin/ifconfig
debug: Command '/sbin/ps laxww ' disabled (badness 125)
debug: Got 0.51 bytes of entropy from /sbin/ps
debug: Got 2.00 bytes of entropy from /sbin/ps
debug: Got 0.14 bytes of entropy from /usr/bin/w
debug: Command '/sbin/who -i ' disabled (badness 125)
debug: Got 0.13 bytes of entropy from /usr/bin/last
debug: Got 0.82 bytes of entropy from /sbin/df
debug: Got 0.81 bytes of entropy from /sbin/df
debug: Got 0.00 bytes of entropy from /usr/bin/uptime
debug: Got 0.07 bytes of entropy from /usr/bin/ipcs
debug: Command '/usr/bin/tail -200 /var/log/messages' disabled (badness 125)
debug: Command '/usr/bin/tail -200 /var/log/syslog' disabled (badness 125)
debug: Command '/usr/bin/tail -200 /var/adm/messages' disabled (badness 125)
debug: Got 2.00 bytes of entropy from /usr/bin/tail
debug: Command '/usr/bin/tail -200 /var/adm/syslog/syslog.log' disabled (badness 125)
debug: Command '/usr/bin/tail -200 /var/log/maillog' disabled (badness 125)
debug: Command '/usr/bin/tail -200 /var/adm/maillog' disabled (badness 125)
debug: Command '/usr/bin/ls -alni /var/log' disabled (badness 124)
debug: Got 0.19 bytes of entropy from /usr/bin/ls
debug: Got 0.17 bytes of entropy from /usr/bin/ls
debug: Got 0.01 bytes of entropy from /usr/bin/ls
debug: Got 0.87 bytes of entropy from /usr/bin/ls
debug: Got 0.07 bytes of entropy from /usr/bin/ls
debug: Got 1.00 bytes of entropy from /usr/bin/netstat
debug: Got 0.19 bytes of entropy from /usr/bin/netstat
debug: Got 0.05 bytes of entropy from /usr/bin/netstat
debug: Got 0.36 bytes of entropy from /usr/bin/netstat
debug: Got 0.06 bytes of entropy from /usr/sbin/arp
debug: Got 0.06 bytes of entropy from /usr/sbin/ifconfig
debug: Command '/sbin/ps laxww ' disabled (badness 124)
debug: Got 0.26 bytes of entropy from /sbin/ps
debug: Got 1.00 bytes of entropy from /sbin/ps
debug: Got 0.07 bytes of entropy from /usr/bin/w
debug: Command '/sbin/who -i ' disabled (badness 124)
debug: Got 0.06 bytes of entropy from /usr/bin/last
debug: Got 0.41 bytes of entropy from /sbin/df
debug: Got 0.40 bytes of entropy from /sbin/df
debug: Got 0.00 bytes of entropy from /usr/bin/uptime
debug: Got 0.04 bytes of entropy from /usr/bin/ipcs
debug: Command '/usr/bin/tail -200 /var/log/messages' disabled (badness 124)
debug: Command '/usr/bin/tail -200 /var/log/syslog' disabled (badness 124)
debug: Command '/usr/bin/tail -200 /var/adm/messages' disabled (badness 124)
debug: Got 1.00 bytes of entropy from /usr/bin/tail
debug: Command '/usr/bin/tail -200 /var/adm/syslog/syslog.log' disabled (badness 124)
debug: Command '/usr/bin/tail -200 /var/log/maillog' disabled (badness 124)
debug: Command '/usr/bin/tail -200 /var/adm/maillog' disabled (badness 124)
debug: 30 bytes from programs
debug: OpenSSL random status is now 1

debug: Seeding random number generator.
debug: OpenSSL random status is now 1

debug: 3 bytes from system calls
debug: Command '/usr/bin/ls -alni /var/log' disabled (badness 123)
debug: Got 0.39 bytes of entropy from /usr/bin/ls
debug: Got 0.33 bytes of entropy from /usr/bin/ls
debug: Got 0.02 bytes of entropy from /usr/bin/ls
debug: Got 1.73 bytes of entropy from /usr/bin/ls
debug: Got 0.14 bytes of entropy from /usr/bin/ls
debug: Got 2.00 bytes of entropy from /usr/bin/netstat
debug: Got 0.38 bytes of entropy from /usr/bin/netstat
debug: Got 0.11 bytes of entropy from /usr/bin/netstat
debug: Got 0.73 bytes of entropy from /usr/bin/netstat
debug: Got 0.12 bytes of entropy from /usr/sbin/arp
debug: Got 0.11 bytes of entropy from /usr/sbin/ifconfig
debug: Command '/sbin/ps laxww ' disabled (badness 123)
debug: Got 0.51 bytes of entropy from /sbin/ps
debug: Got 2.00 bytes of entropy from /sbin/ps
debug: Got 0.14 bytes of entropy from /usr/bin/w
debug: Command '/sbin/who -i ' disabled (badness 123)
debug: Got 0.13 bytes of entropy from /usr/bin/last
debug: Got 0.82 bytes of entropy from /sbin/df
debug: Got 0.81 bytes of entropy from /sbin/df
debug: Got 0.00 bytes of entropy from /usr/bin/uptime
debug: Got 0.07 bytes of entropy from /usr/bin/ipcs
debug: Command '/usr/bin/tail -200 /var/log/messages' disabled (badness 123)
debug: Command '/usr/bin/tail -200 /var/log/syslog' disabled (badness 123)
debug: Command '/usr/bin/tail -200 /var/adm/messages' disabled (badness 123)
debug: Got 2.00 bytes of entropy from /usr/bin/tail
debug: Command '/usr/bin/tail -200 /var/adm/syslog/syslog.log' disabled (badness 123)
debug: Command '/usr/bin/tail -200 /var/log/maillog' disabled (badness 123)
debug: Command '/usr/bin/tail -200 /var/adm/maillog' disabled (badness 123)
debug: Command '/usr/bin/ls -alni /var/log' disabled (badness 122)
debug: Got 0.19 bytes of entropy from /usr/bin/ls
debug: Got 0.17 bytes of entropy from /usr/bin/ls
debug: Got 0.01 bytes of entropy from /usr/bin/ls
debug: Got 0.87 bytes of entropy from /usr/bin/ls
debug: Got 0.07 bytes of entropy from /usr/bin/ls
debug: Got 1.00 bytes of entropy from /usr/bin/netstat
debug: Got 0.19 bytes of entropy from /usr/bin/netstat
debug: Got 0.05 bytes of entropy from /usr/bin/netstat
debug: Got 0.36 bytes of entropy from /usr/bin/netstat
debug: Got 0.06 bytes of entropy from /usr/sbin/arp
debug: Got 0.06 bytes of entropy from /usr/sbin/ifconfig
debug: Command '/sbin/ps laxww ' disabled (badness 122)
debug: Got 0.26 bytes of entropy from /sbin/ps
debug: Got 1.00 bytes of entropy from /sbin/ps
debug: Got 0.07 bytes of entropy from /usr/bin/w
debug: Command '/sbin/who -i ' disabled (badness 122)
debug: Got 0.06 bytes of entropy from /usr/bin/last
debug: Got 0.41 bytes of entropy from /sbin/df
debug: Got 0.40 bytes of entropy from /sbin/df
debug: Got 0.00 bytes of entropy from /usr/bin/uptime
debug: Got 0.04 bytes of entropy from /usr/bin/ipcs
debug: Command '/usr/bin/tail -200 /var/log/messages' disabled (badness 122)
debug: Command '/usr/bin/tail -200 /var/log/syslog' disabled (badness 122)
debug: Command '/usr/bin/tail -200 /var/adm/messages' disabled (badness 122)
debug: Got 1.00 bytes of entropy from /usr/bin/tail
debug: Command '/usr/bin/tail -200 /var/adm/syslog/syslog.log' disabled (badness 122)
debug: Command '/usr/bin/tail -200 /var/log/maillog' disabled (badness 122)
debug: Command '/usr/bin/tail -200 /var/adm/maillog' disabled (badness 122)
debug: 30 bytes from programs
debug: OpenSSL random status is now 1

RSA key generation complete.
debug: Server will not fork when running in debugging mode.
Connection from 208.139.26.70 port 4205
debug: Client protocol version 2.0; client software version 3.0 SecureCRT (tm), a product of Van Dyke Technologies, Inc.
Enabling compatibility mode for protocol 2.0
debug: Local version string SSH-1.99-OpenSSH-2.0
debug: Sending KEX init.
debug: done
debug: got kexinit string: diffie-hellman-group1-sha1
debug: got kexinit string: ssh-dss
debug: got kexinit string: 3des-cbc
debug: got kexinit string: 3des-cbc
debug: got kexinit string: hmac-md5
debug: got kexinit string: hmac-md5
debug: got kexinit string: none
debug: got kexinit string: none
debug: got kexinit string:
debug: got kexinit string:
debug: first kex follow == 0
debug: reserved == 0
debug: done read kexinit
debug: kex: client->server 3des-cbc hmac-md5 none
debug: kex: server->client 3des-cbc hmac-md5 none
debug: Wait SSH2_MSG_KEXDH_INIT.
debug: bits set: 504/1024
debug: bits set: 507/1024
debug: sig size 20 20
debug: send SSH2_MSG_NEWKEYS.
debug: done: send SSH2_MSG_NEWKEYS.
debug: Wait SSH2_MSG_NEWKEYS.
debug: GOT SSH2_MSG_NEWKEYS.
debug: done: KEX2.
debug: userauth-request for user gem service ssh-connection method password
Accepted password for gem from 208.139.26.70 port 4205 ssh2
debug: Entering interactive session for SSH2.
debug: server_init_dispatch_20
debug: channel_input_open: ctype session rchan 0 win 8192 max 8192
debug: open session
debug: channel 0: new [server-session]
debug: session_new: init
debug: session_new: session 0
debug: session_open: channel 0
debug: session_open: session 0: link with channel 0
debug: confirm session
debug: callback start
debug: session_by_channel: session 0 channel 0
debug: session_input_channel_req: session 0 channel 0 request pty-req reply 0
debug: Received SIGCHLD.

14,000 of the last message and then core dump!
Re: Announce: openssh-2.0.0beta1 [ In reply to ]
On Tue, 2 May 2000, Phil Karn wrote:

> >Note that this release _requires_ OpenSSL 0.9.5 or greater.
>
> If so, then the configure script should be changed to eliminate
> references to SSLeay, especially the message
>
> checking for OpenSSL/SSLeay directory ...

Thanks, fixed.

-d

--
| "Bombay is 250ms from New York in the new world order" - Alan Cox
| Damien Miller - http://www.mindrot.org/
| Email: djm@mindrot.org (home) -or- djm@ibs.com.au (work)