OpenSSH 4.2p1 Compression Problems - SSH

This is a discussion on OpenSSH 4.2p1 Compression Problems - SSH ; I am having trouble getting compression going on Tru64 with OpenSSH 4.2p1. Standard connections work fine, but trying with compression yields this error: buffer_get_ret: trying to get more bytes 1 than in buffer 0 buffer_get_char_ret: buffer_get_ret failed buffer_get_char: buffer error ...

+ Reply to Thread
Results 1 to 5 of 5

Thread: OpenSSH 4.2p1 Compression Problems

  1. OpenSSH 4.2p1 Compression Problems

    I am having trouble getting compression going on Tru64 with OpenSSH
    4.2p1. Standard connections work fine, but trying with compression
    yields this error:

    buffer_get_ret: trying to get more bytes 1 than in buffer 0
    buffer_get_char_ret: buffer_get_ret failed
    buffer_get_char: buffer error

    this is on Tru64 V5.1 1885 alpha

    OpenSSH 4.2p1 was compiled with OpenSSL 0.9.8a and ZLib 1.2.3; all from
    source

    The very verbose log is included below:

    HOST:~ user$ ssh -v -v -C -4 SERVER
    OpenSSH_4.2p1, OpenSSL 0.9.7e 25 Oct 2004
    debug1: Reading configuration data /etc/ssh/ssh_config
    debug2: ssh_connect: needpriv 0
    debug1: Connecting to bullmoose [128.128.30.198] port 22.
    debug1: Connection established.
    debug1: identity file /home/benc/.ssh/identity type -1
    debug1: identity file /home/benc/.ssh/id_rsa type -1
    debug1: identity file /home/benc/.ssh/id_dsa type -1
    debug1: Remote protocol version 1.99, remote software version OpenSSH_4.2
    debug1: match: OpenSSH_4.2 pat OpenSSH*
    debug1: Enabling compatibility mode for protocol 2.0
    debug1: Local version string SSH-2.0-OpenSSH_4.2
    debug2: fd 3 setting O_NONBLOCK
    debug1: SSH2_MSG_KEXINIT sent
    debug1: SSH2_MSG_KEXINIT received
    debug2: kex_parse_kexinit:
    diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
    debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
    debug2: kex_parse_kexinit:
    aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
    debug2: kex_parse_kexinit:
    aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
    debug2: kex_parse_kexinit:
    hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
    debug2: kex_parse_kexinit:
    hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
    debug2: kex_parse_kexinit: zlib@openssh.com,zlib,none
    debug2: kex_parse_kexinit: zlib@openssh.com,zlib,none
    debug2: kex_parse_kexinit:
    debug2: kex_parse_kexinit:
    debug2: kex_parse_kexinit:
    debug2: kex_parse_kexinit:
    debug2: kex_parse_kexinit: first_kex_follows 0
    debug2: kex_parse_kexinit: reserved 0
    debug2: kex_parse_kexinit:
    diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
    debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
    debug2: kex_parse_kexinit:
    aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
    debug2: kex_parse_kexinit:
    aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
    debug2: kex_parse_kexinit:
    hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
    debug2: kex_parse_kexinit:
    hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
    debug2: kex_parse_kexinit: none,zlib@openssh.com
    debug2: kex_parse_kexinit: none,zlib@openssh.com
    debug2: kex_parse_kexinit:
    debug2: kex_parse_kexinit:
    debug2: kex_parse_kexinit: first_kex_follows 0
    debug2: kex_parse_kexinit: reserved 0
    debug2: mac_init: found hmac-md5
    debug1: kex: server->client aes128-cbc hmac-md5 zlib@openssh.com
    debug2: mac_init: found hmac-md5
    debug1: kex: client->server aes128-cbc hmac-md5 zlib@openssh.com
    debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent
    debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
    debug2: dh_gen_key: priv key bits set: 113/256
    debug2: bits set: 509/1024
    debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
    debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
    debug1: Host 'bullmoose' is known and matches the RSA host key.
    debug1: Found key in /home/benc/.ssh/known_hosts:21
    debug2: bits set: 510/1024
    debug1: ssh_rsa_verify: signature correct
    debug2: kex_derive_keys
    debug2: set_newkeys: mode 1
    debug1: SSH2_MSG_NEWKEYS sent
    debug1: expecting SSH2_MSG_NEWKEYS
    debug2: set_newkeys: mode 0
    debug1: SSH2_MSG_NEWKEYS received
    debug1: SSH2_MSG_SERVICE_REQUEST sent
    debug2: service_accept: ssh-userauth
    debug1: SSH2_MSG_SERVICE_ACCEPT received
    debug2: key: /home/benc/.ssh/identity ((nil))
    debug2: key: /home/benc/.ssh/id_rsa ((nil))
    debug2: key: /home/benc/.ssh/id_dsa ((nil))
    debug1: Authentications that can continue:
    publickey,password,keyboard-interactive
    debug1: Next authentication method: publickey
    debug1: Trying private key: /home/benc/.ssh/identity
    debug1: Trying private key: /home/benc/.ssh/id_rsa
    debug1: Trying private key: /home/benc/.ssh/id_dsa
    debug2: we did not send a packet, disable method
    debug1: Next authentication method: keyboard-interactive
    debug2: userauth_kbdint
    debug2: we sent a keyboard-interactive packet, wait for reply
    debug1: Authentications that can continue:
    publickey,password,keyboard-interactive
    debug2: we did not send a packet, disable method
    debug1: Next authentication method: password
    user@SERVER's password:
    debug2: we sent a password packet, wait for reply
    debug1: Enabling compression at level 6.
    debug1: Authentication succeeded (password).
    debug1: channel 0: new [client-session]
    debug2: channel 0: send open
    debug1: Entering interactive session.
    buffer_get_ret: trying to get more bytes 1 than in buffer 0
    buffer_get_char_ret: buffer_get_ret failed
    buffer_get_char: buffer error

  2. Re: OpenSSH 4.2p1 Compression Problems

    Ben Carr wrote:
    > I am having trouble getting compression going on Tru64 with OpenSSH
    > 4.2p1. Standard connections work fine, but trying with compression
    > yields this error:
    >
    > buffer_get_ret: trying to get more bytes 1 than in buffer 0
    > buffer_get_char_ret: buffer_get_ret failed
    > buffer_get_char: buffer error
    >
    > this is on Tru64 V5.1 1885 alpha
    >
    > OpenSSH 4.2p1 was compiled with OpenSSL 0.9.8a and ZLib 1.2.3; all
    > from source


    What compiler did you use? I've found the Tru64 compilers to be.... pretty
    questionable when dealing with open source stuff.



  3. Re: OpenSSH 4.2p1 Compression Problems

    Nico Kadel-Garcia wrote:
    > Ben Carr wrote:
    >> I am having trouble getting compression going on Tru64 with OpenSSH
    >> 4.2p1. Standard connections work fine, but trying with compression
    >> yields this error:
    >>
    >> buffer_get_ret: trying to get more bytes 1 than in buffer 0
    >> buffer_get_char_ret: buffer_get_ret failed
    >> buffer_get_char: buffer error
    >>
    >> this is on Tru64 V5.1 1885 alpha
    >>
    >> OpenSSH 4.2p1 was compiled with OpenSSL 0.9.8a and ZLib 1.2.3; all
    >> from source

    >
    > What compiler did you use? I've found the Tru64 compilers to be.... pretty
    > questionable when dealing with open source stuff.


    It was compiled with Compaq's Tru64 C Compiler.

  4. Re: OpenSSH 4.2p1 Compression Problems


    "Ben Carr" wrote in message
    news:dr3apn$3c7$1@baldur.whoi.edu...
    > Nico Kadel-Garcia wrote:
    >> Ben Carr wrote:
    >>> I am having trouble getting compression going on Tru64 with OpenSSH
    >>> 4.2p1. Standard connections work fine, but trying with compression
    >>> yields this error:
    >>>
    >>> buffer_get_ret: trying to get more bytes 1 than in buffer 0
    >>> buffer_get_char_ret: buffer_get_ret failed
    >>> buffer_get_char: buffer error
    >>>
    >>> this is on Tru64 V5.1 1885 alpha
    >>>
    >>> OpenSSH 4.2p1 was compiled with OpenSSL 0.9.8a and ZLib 1.2.3; all
    >>> from source

    >>
    >> What compiler did you use? I've found the Tru64 compilers to be....
    >> pretty questionable when dealing with open source stuff.

    >
    > It was compiled with Compaq's Tru64 C Compiler.


    *GACK*. OK, I suspect that's a big part of your problem. Take a look over at
    http://h30097.www3.hp.com/affinity/a...ls.html#gnupro for a stack of
    open source tools, such as gcc and RPM for package management.



  5. Re: OpenSSH 4.2p1 Compression Problems

    On 2006-01-23, Nico Kadel-Garcia wrote:
    > "Ben Carr" wrote in message
    > news:dr3apn$3c7$1@baldur.whoi.edu...

    [...]
    >> It was compiled with Compaq's Tru64 C Compiler.

    >
    > *GACK*. OK, I suspect that's a big part of your problem. Take a look over at
    > http://h30097.www3.hp.com/affinity/a...ls.html#gnupro for a stack of
    > open source tools, such as gcc and RPM for package management.


    You could also try recompiling zlib and/or openssh without optimization.

    --
    Darren Tucker (dtucker at zip.com.au)
    GPG key 8FF4FA69 / D9A3 86E9 7EEE AF4B B2D4 37C9 C982 80C7 8FF4 FA69
    Good judgement comes with experience. Unfortunately, the experience
    usually comes from bad judgement.

+ Reply to Thread