On Apr 2, 8:31 pm, lyn...@orthanc.ca (Lyndon Nerenberg) wrote: > On 2012-04-02, at 7:27 PM, Lyndon Nerenberg wrote: > > > I haven't tried genning up a CPU kernel with the new factotum yet. > > Sorry, I meant to say "with Richard's patched original factotum." (if there is a double-post in play or in an individuals mailbox pardon me, i tried using comp.os.plan9 on the web and I am not sure where "reply" sent the message") I haven't tried building a new pccpuf kernel yet either, but on rebooting with factotum and ssh binaries built from from blstuart/ssh and on miller/factotum I get to "auth Authentication failed" I think I might have something configured wrong, and not a bug, so please look? any thoughts/suggestions/other debugging tools? Here is some output from acid -l truss on my plan9 client, and the sshd -d logs from my gentoo sshd host /*acid -l truss /bin/ssh */ acid: new() acid: truss() fd2path(0, 0xdfffdeb0, 64) return value: 0 data: "/dev/cons" brk_(0x0000fd60) return value: 0 stat("/net/ssh", 0x0000ede4, 115) return value: -1 rfork(0x00000038) return value: 7629 await(0xdfffdcec, 511, 511) return value: 38 data: "7629 0 10 10 'sshtun 7629: threadmain'" rfork(0x00000074) return value: 7632 notify(0x0000405c) return value: 0 open("/net/cs", 2) return value: 4 pwrite(4, "ssh!192.168.1.10!22", 19, 4294967295) return value: 19 seek(0x0000e754, 4, 0, 0) return value: 0 pread(4, 0xdfffdcb0, 127, 4294967295) return value: 30 data: "/net/ssh/clone 192.168.1.10!22" open("/net/ssh/clone", 2) return value: 7 pread(7, 0xdfffd880, 255, 4294967295) return value: 1 data: "0" pwrite(7, "connect 192.168.1.10!22", 23, 4294967295) return value: 23 open("/net/ssh/0/data", 2) return value: 10 close(4) return value: 0 errstr(0xdfffda08, 128, 128) return value: 0 data: "'/net/ssh' dns: file does not exist" seek(0x0000e754, 7, 0, 0) return value: 0 pread(7, 0xdfffdf1c, 10, 4294967295) return value: 1 data: "0" open("/dev/cons", 2) return value: 4 open("/dev/consctl", 1) return value: 11 pwrite(11, "rawon", 5, 4294967295) return value: 5 pwrite(7, "ssh-userauth K rhoyerboat", 18, 4294967295) return value: -1 open("/mnt/factotum/rpc", 2) return value: 12 brk_(0x00011de8) return value: 0 pwrite(12, "start proto=pass service=ssh server=192.168.1.10 user=rhoyerboat", 57, 4294967295) return value: 57 pread(12, 0x0000ed6c, 4096, 4294967295) return value: 2 data: "ok" pwrite(12, "read ", 5, 4294967295) return value: 5 pread(12, 0x0000ed6c, 4096, 4294967295) return value: 21 data: "ok rhoyerboat XXXX12345" close(12) return value: 0 pwrite(7, "ssh-userauth k rhoyerboat XXXX12345", 33, 4294967295) return value: -1 errstr(0xdfffdbe0, 128, 128) return value: 0 data: "Authentication failed" errstr(0xdfffdbe0, 128, 128) return value: 0 data: "(null)" pwrite(2, "auth Authentication failed ", 27, 4294967295) auth Authentication failed return value: 27 pwrite(11, "rawoff", 6, 4294967295) return value: 6 close(11) return value: 0 close(4) return value: 0 pwrite(0, "close", 5, 4294967295) return value: -1 close(0) return value: 0 close(0) return value: -1 close(10) return value: 0 close(0) return value: -1 close(7) return value: 0 pwrite(0, "kill", 4, 4294967295) return value: -1 close(0) return value: -1 open("#c/pid", 0) return value: 0 pread(0, 0xdfffdec0, 20, 4294967295) return value: 12 data: " 7628 " close(0) return value: 0 7628: breakpoint _exits+0x5 INTB $0x40 /* sshd -d logs */ Connection from 192.168.1.9 port 41598 debug1: HPN Disabled: 0, HPN Buffer Size: 87380 debug1: Client protocol version 2.0; client software version Plan9 SSH: Server;Ltype: Version;Remote: 192.168.1.9-41598;Protocol: 2.0;Client: Plan9 debug1: no match: Plan9 debug1: Enabling compatibility mode for protocol 2.0 debug1: Local version string SSH-2.0-OpenSSH_5.8p1-hpn13v10 debug1: permanently_set_uid: 22/22 debug1: MYFLAG IS 1 debug1: list_hostkey_types: ssh-rsa,ssh-dss,ecdsa-sha2-nistp256 debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: AUTH STATE IS 0 debug1: REQUESTED ENC.NAME is 'aes128-cbc' debug1: kex: client->server aes128-cbc hmac-sha1 none SSH: Server;Ltype: Kex;Remote: 192.168.1.9-41598;Enc: aes128-cbc;MAC: hmac-sha1;Comp: none debug1: REQUESTED ENC.NAME is 'aes128-cbc' debug1: kex: server->client aes128-cbc hmac-sha1 none debug1: expecting SSH2_MSG_KEXDH_INIT debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug1: SSH2_MSG_NEWKEYS received debug1: KEX done debug1: userauth-request for user rhoyerboat service ssh-connection method password SSH: Server;Ltype: Authname;Remote: 192.168.1.9-41598;Name: rhoyerboat debug1: attempt 0 failures 0 debug1: Config token is loglevel debug1: Config token is permitrootlogin debug1: Config token is rsaauthentication debug1: Config token is pubkeyauthentication debug1: Config token is authorizedkeysfile debug1: Config token is passwordauthentication debug1: Config token is usepam debug1: Config token is printmotd debug1: Config token is printlastlog debug1: Config token is subsystem debug1: PAM: initializing for rhoyerboat debug1: PAM: setting PAM_RHOST to 192.168.1.9 debug1: PAM: setting PAM_TTY to ssh Read from socket failed: Connection reset by peer debug1: do_cleanup debug1: do_cleanup debug1: PAM: cleanup On Thu, Mar 29, 2012 at 8:10 PM, wrote: > Thanks to the support of Coraid, I am pleased to announce > that a native SSHv2 implementation is now available in > contrib. It's available in: > > contrib/blstuart/ssh > > You'll also need the backported p9p factotum in: > > contrib/quanstro/root/sys/src/cmd/auth/factotum > > Although not strictly necessary it's also helpful to add ssh > to the protocols cs understands: > > { "ssh", iplookup, iptrans, 1 }, > > There's a man page that will hopefully help to get anyone > started who wants to play with it. > > No doubt, there are still some rough edges. But we've been > using it at Coraid for a while now so at least a few of the > rough edges should be polished. Also there are some parts > of the code that are a little ugly, and I plan to clean them up. > But lest it live in a perpetual state of "just one more thing I > need to clean up" here it is. > > Good luck and enjoy, > BLS > > >