SSH daemon segmentation fault

SSH daemon segmentation fault

am 21.09.2005 09:23:23 von Martin Klier

--Boundary-02=_tpQMD7Oo/JPIGFp
Content-Type: text/plain;
charset="iso-8859-15"
Content-Transfer-Encoding: quoted-printable
Content-Disposition: inline

Hi there,

I'm experiencing a strange, annoying ssh daemon problem, I'm rather=20
desperated:

At transmitting huge files (about 2GB) via scp to the ssh server, I earn an=
=20
"Connection reset by peer" in about 90% of the cases, in average between th=
e=20
100th and 1800th megabyte of transfer. Long-lasting ssh sessions without hu=
ge=20
data amounts remain untouched.

Tracking down the issue, I found out that the TCP session is terminated by=
=20
flags RST,ACK, for which RFC793 says "connection not known to the stack".
Due to this, I started verbose logging of the daemon, the end of the log=20
created by sshd -ddd follows here:

=2D-------------------cut---------------------
debug2: channel 0: window 61440 sent adjust 69632

debug2: channel 0: window 61440 sent adjust 69632
debug2: channel 0: window 61440 sent adjust 69632
Segmentation fault
=2D-------------------cut---------------------
Nothing further, of course the process is dead now.

The client tells me the following:
=2D-------------------cut---------------------

debug3: channel 0: close_fds r -1 w -1 e -1
test.zero |========> 75% 1509MB 10.5MB/s 00:46 ETA
Read from remote host svdbslx007: Connection reset by peer
lost connection
=2D-------------------cut---------------------
I see, referencing to the received RST the client could not do anything=20
else :)

The SSH server is a SLES9 32bit, I already updated to SP1 and SP2 - no chan=
ge=20
of the behaviour. Actually the sshd version is OpenSSH_3.8p1.

As client I tried several SuSE versions (9.3 Prof at current patch level,=20
SLES9 32bit at SP2, SLES9 64bit SP1, etc...) and my Debian Sarge stable=20
notebook. Always the same.

Are there any suggestions?

Thanks in advance and best regards,
=2D-=20
Mit freundlichen Grüßen

i.A. Martin Klier
PC-Benutzerunterstützung / Linux-Server
IT Asset Management

A.T.U - Auto-Teile-Unger
Dr.-Kilian-Straße 11
92637 Weiden

--Boundary-02=_tpQMD7Oo/JPIGFp
Content-Type: application/pgp-signature
Content-Description: signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQBDMQptVKZfihvnEcQRAuQjAJ0cbOvItED6i8zixWjk85+KMN3mPwCg iCbc
x8UB8lY3Nghq3fRhzRY09g4=
=3RWF
-----END PGP SIGNATURE-----

--Boundary-02=_tpQMD7Oo/JPIGFp--

-
To unsubscribe from this list: send the line "unsubscribe linux-admin" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html

Re: SSH daemon segmentation fault

am 21.09.2005 11:33:26 von Michael Iatrou

When the date was Wednesday 21 September 2005 10:23, Martin Klier wrote:

> Actually the sshd version is OpenSSH_3.8p1.

Update it to OpenSSH 4.1p1.
If you really need to hunt the bug, try to strace sshd.

--
Michael Iatrou
Electrical and Computer Engineering Dept.
University of Patras, Greece
-
To unsubscribe from this list: send the line "unsubscribe linux-admin" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html

Re: SSH daemon segmentation fault

am 21.09.2005 15:13:15 von Martin Klier

--Boundary-02=_rxVMDHYa7rQV7pw
Content-Type: text/plain;
charset="iso-8859-15"
Content-Transfer-Encoding: quoted-printable
Content-Disposition: inline

Hi Michael,

Am Mittwoch, 21. September 2005 11:33 schrieb Michael Iatrou:
> Update it to OpenSSH 4.1p1.
I think it's not possible, I need the certified base OS for support contrac=
ts.=20
SuSE does not provide a newer version.

> If you really need to hunt the bug, try to strace sshd.
I will try and keep you updated.

Regards,
=2D-=20
Mit freundlichen Grüßen

i.A. Martin Klier
PC-Benutzerunterstützung / Linux-Server
IT Asset Management

A.T.U - Auto-Teile-Unger
Dr.-Kilian-Straße 11
92637 Weiden

Telefon: (0961) 306-5663
Telefax: (0961) 306-9345663

Internet: www.atu.de

Diese E-Mail enthält vertrauliche und/oder rechtlich geschützte
Informationen. Wenn Sie nicht der richtige Adressat sind oder diese E-Mail
irrtümlich erhalten haben, informieren Sie bitte sofort den Absender und
vernichten Sie diese Mail. Das unerlaubte Kopieren sowie die unbefugte
Weitergabe dieser Mail ist nicht gestattet.

--Boundary-02=_rxVMDHYa7rQV7pw
Content-Type: application/pgp-signature
Content-Description: signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQBDMVxrVKZfihvnEcQRAur/AKCoOvVvdBbT2XnLas94AkQJY3maigCe JZmD
lEyGIkvFf3T1e2NMYRtYUOI=
=ymNu
-----END PGP SIGNATURE-----

--Boundary-02=_rxVMDHYa7rQV7pw--
-
To unsubscribe from this list: send the line "unsubscribe linux-admin" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html