info-cvs
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: CVS hangs on exit when using SSH


From: Wayne Johnson
Subject: Re: CVS hangs on exit when using SSH
Date: Sun, 1 Dec 2002 17:46:58 -0800 (PST)

Just a guess, have you disabled the escape sequence in SSH?

--- Ken Williams <address@hidden> wrote:
> Hi,
> 
> I've seen this problem several times in various CVS and SSH mailing 
> lists, but none of the threads I've found seem to end in a solution.
> 
> I'm using CVS 1.10 `Halibut' as a client, connecting to CVS 1.11.2 on a
> 
> server via SSH.  Both the client and server are running OpenSSH_3.4p1, 
> SSH protocols 1.5/2.0, OpenSSL 0x0090605f.  The client is a Mac OS X 
> 10.1.5 machine and the server is running Red Hat Linux release 8.0.
> 
> When I issue any CVS command (update, checkout, diff, etc.), the 
> connection hangs indefinitely when the command is [nearly?] completed. 
> 
> It happens reliably on this client, but never happens on another client
> 
> with identical software versions.
> 
> When I set CVS_RSH to a shell script that does 'exec ssh -vvv "$@"', I 
> get the following output (I hit Ctrl-C after about 30 seconds):
> 
> ---------------------------------------------------------------------
> % cvs up
> OpenSSH_3.4p1, SSH protocols 1.5/2.0, OpenSSL 0x0090605f
> debug1: Reading configuration data /etc/ssh_config
> debug1: Rhosts Authentication disabled, originating port will not be 
> trusted.
> debug1: ssh_connect: needpriv 0
> debug1: Connecting to ebt.ee.usyd.edu.au [129.78.13.247] port 22.
> debug1: Connection established.
> debug1: identity file /Users/ken/.ssh/identity type 0
> debug3: Not a RSA1 key file /Users/ken/.ssh/id_rsa.
> debug2: key_type_from_name: unknown key type '-----BEGIN'
> debug3: key_read: no key found
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug2: key_type_from_name: unknown key type '-----END'
> debug3: key_read: no key found
> debug1: identity file /Users/ken/.ssh/id_rsa type 1
> debug3: Not a RSA1 key file /Users/ken/.ssh/id_dsa.
> debug2: key_type_from_name: unknown key type '-----BEGIN'
> debug3: key_read: no key found
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug3: key_read: no space
> debug2: key_type_from_name: unknown key type '-----END'
> debug3: key_read: no key found
> debug1: identity file /Users/ken/.ssh/id_dsa type 2
> debug1: Remote protocol version 1.99, remote software version 
> OpenSSH_3.4p1
> debug1: match: OpenSSH_3.4p1 pat OpenSSH*
> Enabling compatibility mode for protocol 2.0
> debug1: Local version string SSH-2.0-OpenSSH_3.4p1
> debug1: SSH2_MSG_KEXINIT sent
> debug1: SSH2_MSG_KEXINIT received
> debug2: kex_parse_kexinit: diffie-hellman-group-exchange-
> sha1,diffie-hellman-group1-sha1
> debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
> debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-
>
cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,address@hidden
> debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-
>
cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,address@hidden
> debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-
> ripemd160,address@hidden,hmac-sha1-96,hmac-md5-96
> debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-
> ripemd160,address@hidden,hmac-sha1-96,hmac-md5-96
> debug2: kex_parse_kexinit: none
> debug2: kex_parse_kexinit: none
> debug2: kex_parse_kexinit:
> debug2: kex_parse_kexinit:
> debug2: kex_parse_kexinit: first_kex_follows 0
> debug2: kex_parse_kexinit: reserved 0
> debug2: kex_parse_kexinit: diffie-hellman-group-exchange-
> sha1,diffie-hellman-group1-sha1
> debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
> debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-
>
cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,address@hidden
> debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-
>
cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,address@hidden
> debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-
> ripemd160,address@hidden,hmac-sha1-96,hmac-md5-96
> debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-
> ripemd160,address@hidden,hmac-sha1-96,hmac-md5-96
> debug2: kex_parse_kexinit: none,zlib
> debug2: kex_parse_kexinit: none,zlib
> debug2: kex_parse_kexinit:
> debug2: kex_parse_kexinit:
> debug2: kex_parse_kexinit: first_kex_follows 0
> debug2: kex_parse_kexinit: reserved 0
> debug2: mac_init: found hmac-md5
> debug1: kex: server->client aes128-cbc hmac-md5 none
> debug2: mac_init: found hmac-md5
> debug1: kex: client->server aes128-cbc hmac-md5 none
> debug1: SSH2_MSG_KEX_DH_GEX_REQUEST sent
> debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
> debug1: dh_gen_key: priv key bits set: 135/256
> debug1: bits set: 1567/3191
> debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
> debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
> debug3: check_host_in_hostfile: filename /Users/ken/.ssh/known_hosts2
> debug3: check_host_in_hostfile: filename /etc/ssh_known_hosts2
> debug3: check_host_in_hostfile: filename /Users/ken/.ssh/known_hosts2
> debug3: check_host_in_hostfile: filename /etc/ssh_known_hosts2
> debug3: check_host_in_hostfile: filename /Users/ken/.ssh/known_hosts
> debug3: key_read: type mismatch
> debug3: check_host_in_hostfile: match line 18
> debug3: check_host_in_hostfile: filename /Users/ken/.ssh/known_hosts
> debug3: key_read: type mismatch
> debug3: check_host_in_hostfile: match line 18
> debug1: Host 'ebt.ee.usyd.edu.au' is known and matches the RSA host
> key.
> debug1: Found key in /Users/ken/.ssh/known_hosts:18
> debug1: bits set: 1618/3191
> debug1: ssh_rsa_verify: signature correct
> debug1: kex_derive_keys
> debug1: newkeys: mode 1
> debug1: SSH2_MSG_NEWKEYS sent
> debug1: waiting for SSH2_MSG_NEWKEYS
> debug1: newkeys: mode 0
> debug1: SSH2_MSG_NEWKEYS received
> debug1: done: ssh_kex2.
> debug1: send SSH2_MSG_SERVICE_REQUEST
> debug1: service_accept: ssh-userauth
> debug1: got SSH2_MSG_SERVICE_ACCEPT
> debug1: authentications that can continue: 
> publickey,password,keyboard-interactive
> debug3: start over, passed a different list 
> publickey,password,keyboard-interactive
> debug3: preferred publickey,keyboard-interactive,password
> debug3: authmethod_lookup publickey
> debug3: remaining preferred: keyboard-interactive,password
> debug3: authmethod_is_enabled publickey
> debug1: next auth method to try is publickey
> debug1: try pubkey: /Users/ken/.ssh/id_rsa
> debug3: send_pubkey_test
> debug2: we sent a publickey packet, wait for reply
> debug1: input_userauth_pk_ok: pkalg ssh-rsa blen 149 lastkey 0x4ebc0 
> hint 1
> debug2: input_userauth_pk_ok: fp 
> 74:af:ca:bc:71:e3:45:08:c5:32:31:de:98:25:23:8a
> debug3: sign_and_send_pubkey
> debug1: read PEM private key done: type RSA
> debug1: ssh-userauth2 successful: method publickey
> debug1: fd 5 setting O_NONBLOCK
> debug1: fd 7 setting O_NONBLOCK
> debug1: channel 0: new [client-session]
> debug3: ssh_session2_open: channel_new: 0
> debug1: send channel open 0
> debug1: Entering interactive session.
> debug2: callback start
> debug1: ssh_session2_setup: id 0
> debug1: Sending command: cvs server
> debug1: channel request 0: exec
> debug2: callback done
> debug1: channel 0: open confirm rwindow 0 rmax 32768
> debug2: channel 0: rcvd adjust 131072
> ? results
> ? results-drmath.txt
> ? results-reuters.txt
> ? tmon.out
> ? tree-spam.png
> ? corpora/20news-18827.tar.gz
> ? corpora/drmath-1.00-small
> ? corpora/drmath-1.00-small.tgz
> ? corpora/drmath-NBB-results.txt
> ? corpora/drmath-NBB-results2.txt
> ? corpora/drmath-results.txt
> ? corpora/reuters-results.txt
> ? doc/aptemod.xls
> ? doc/Corpora-new.xls
> ? doc/current_design.graffle
> ? doc/data-model.graffle
> ? doc/drmath-run.xls
> ? doc/Framework-PSD.txt
> ? doc/inheritance-uml.dot
> ? doc/position-bias.xls
> ? doc/proposed_design.graffle
> ? doc/ADCS-SignalG/sr-save.pdf
> ? doc/ADCS-SignalG/TC-References.bib
> ? doc/Thesis/figures/diagram-key.graffle
> ? doc/Thesis/figures/inheritance-uml.graffle
> ? experiments/drmath-small-NB.yaml
> ? ref/ktrace.out
> ? ref/Tumer-Ghosh-1996.ps
> ? tools/out.dot
> ? tools/out.png
> ? tools/scan.pl
> M doc/Thesis/ch01.tex
> M doc/Thesis/ch02.tex
> M doc/Thesis/ch03.tex
> M doc/Thesis/ch05.tex
> M tools/scan_classes.pl
> ^Ccvs [update aborted]: received interrupt signal
> debug1: channel_free: channel 0: client-session, nchannels 1
> debug3: channel_free: status: The following connections are open:
>    #0 client-session (t4 r0 i0/0 o0/0 fd 5/7)
> 
> debug3: channel_close_fds: channel 0: r 5 w 7 e 8
> debug1: fd 0 clearing O_NONBLOCK
> debug1: fd 1 clearing O_NONBLOCK
> Killed by signal 2.
> debug1: Calling cleanup 0xdf14(0x0)
> debug1: Calling cleanup 0x18188(0x0)
> %
> ---------------------------------------------------------------------
> 
> Any help?
> 
>   -Ken
> 
> 
> 
> _______________________________________________
> Info-cvs mailing list
> address@hidden
> http://mail.gnu.org/mailman/listinfo/info-cvs


=====
---
Wayne Johnson,             | There are two kinds of people: Those 
3943 Penn Ave. N.          | who say to God, "Thy will be done," 
Minneapolis, MN 55412-1908 | and those to whom God says, "All right, 
(612) 522-7003             | then,  have it your way." --C.S. Lewis

__________________________________________________
Do you Yahoo!?
Yahoo! Mail Plus - Powerful. Affordable. Sign up now.
http://mailplus.yahoo.com




reply via email to

[Prev in Thread] Current Thread [Next in Thread]