[Bug 1163200] New: SSH process often not "Entering interactive session" when executed by script
http://bugzilla.opensuse.org/show_bug.cgi?id=1163200 Bug ID: 1163200 Summary: SSH process often not "Entering interactive session" when executed by script Classification: openSUSE Product: openSUSE Distribution Version: Leap 15.1 Hardware: x86-64 OS: SUSE Other Status: NEW Severity: Normal Priority: P5 - None Component: Network Assignee: bnc-team-screening@forge.provo.novell.com Reporter: Stefan.Welscher@telekom.de QA Contact: qa-bugs@suse.de Found By: --- Blocker: --- I have a script which dynamically creates a tunnel to a destination only reachable by a intermediate hop. This is done using the following command on a session with "raw" and "-echo": /usr/bin/ssh -N -f -4 -o PreferredAuthentications=password -o ExitOnForwardFailure=yes -o ServerAliveInterval=10 -o ServerAliveCountMax=2 -L localport:ipv4_destination_address:22 user@ipv4_hop_adress 2>&1 && echo EXPECT_EOF When executing this command manual via bash, it always works without any problems. When executing this command via script (perl/Expect.pm) it sometimes works and sometimes doesn't (in cases it doesn't work, no corresponding local ssh process is listed on ps), but as far as I could see on my tests, it alwayss works if I respawn the command on the same script immideately after, if the process is missing. This is a workaround, but it takes some time. On the debug output (-vvv), in cases the command doesn't work, the last two debug lines are missing: ... debug1: Local forwarding listening on 127.0.0.1 port 10003. debug2: fd 4 setting O_NONBLOCK debug3: fd 4 is O_NONBLOCK debug1: channel 0: new [port listener] debug2: fd 3 setting TCP_NODELAY debug3: ssh_packet_set_tos: set IP_TOS 0x10 debug1: Requesting no-more-sessions@openssh.com debug3: send packet: type 80 debug1: forking to background debug1: Entering interactive session. <--- missing if failed debug1: pledge: network <--- missing if failed EXPECT_EOF All other debug lines are exactly the same. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=1163200 http://bugzilla.opensuse.org/show_bug.cgi?id=1163200#c1 --- Comment #1 from Stefan Welscher <Stefan.Welscher@telekom.de> --- Additional Information: ssh -V OpenSSH_7.9p1, OpenSSL 1.1.0i-fips 14 Aug 2018 uname -a Linux Dalek 4.12.14-lp151.28.36-default #1 SMP Fri Dec 6 13:50:27 UTC 2019 (8f4a495) x86_64 x86_64 x86_64 GNU/Linux /etc/ssh/ssh_config: PubkeyAcceptedKeyTypes +ssh-dss Host * # ForwardAgent no # ForwardX11 no ForwardX11Trusted yes SendEnv LANG LC_CTYPE LC_NUMERIC LC_TIME LC_COLLATE LC_MONETARY LC_MESSAGES SendEnv LC_PAPER LC_NAME LC_ADDRESS LC_TELEPHONE LC_MEASUREMENT SendEnv LC_IDENTIFICATION LC_ALL # RhostsRSAAuthentication no # RSAAuthentication yes # PasswordAuthentication yes # HostbasedAuthentication no # GSSAPIAuthentication no # GSSAPIDelegateCredentials no # GSSAPIKeyExchange no # GSSAPITrustDNS no # BatchMode no # CheckHostIP yes # AddressFamily any # ConnectTimeout 0 # StrictHostKeyChecking ask # IdentityFile ~/.ssh/identity # IdentityFile ~/.ssh/id_rsa # IdentityFile ~/.ssh/id_dsa # IdentityFile ~/.ssh/id_ecdsa # IdentityFile ~/.ssh/id_ed25519 # Port 22 # Protocol 2 # Cipher 3des # Ciphers aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc # MACs hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160 # EscapeChar ~ # Tunnel no # TunnelDevice any:any # PermitLocalCommand no # VisualHostKey no # ProxyCommand ssh -q -W %h:%p gateway.example.com # RekeyLimit 1G 1h -- You are receiving this mail because: You are on the CC list for the bug.
participants (1)
-
bugzilla_noreply@novell.com