Upgrade to openssl 1.1.1.d-1 kills all login attempts

Problems with packages? Post here, using [tags] of the package name.

Upgrade to openssl 1.1.1.d-1 kills all login attempts

Postby whatshisname » Thu Sep 12, 2019 10:55 pm

Running arch on a headless Odroid C1 .
Just upgraded to openssl 1.1.1.d-1 and was prevented from logging back in.
Error message: "client_loop: send disconnect: Broken pipe"

As you can see from the logs, authentication was complete:

$this->bbcode_second_pass_code('', '
OpenSSH_8.0p1, OpenSSL 1.1.1d 10 Sep 2019
debug1: Reading configuration data /home/krb/.ssh/config
debug1: /home/krb/.ssh/config line 7: Applying options for odroid
debug1: Reading configuration data /etc/ssh/ssh_config
debug2: resolving "odroid" port 1971
debug2: ssh_connect_direct
debug1: Connecting to odroid [192.168.1.9] port 1971.
debug1: Connection established.
debug1: identity file /home/krb/.ssh/id_rsa type 0
debug1: identity file /home/krb/.ssh/id_rsa-cert type -1
debug1: identity file /home/krb/.ssh/id_dsa type -1
debug1: identity file /home/krb/.ssh/id_dsa-cert type -1
debug1: identity file /home/krb/.ssh/id_ecdsa type -1
debug1: identity file /home/krb/.ssh/id_ecdsa-cert type -1
debug1: identity file /home/krb/.ssh/id_ed25519 type -1
debug1: identity file /home/krb/.ssh/id_ed25519-cert type -1
debug1: identity file /home/krb/.ssh/id_xmss type -1
debug1: identity file /home/krb/.ssh/id_xmss-cert type -1
debug1: Local version string SSH-2.0-OpenSSH_8.0
debug1: Remote protocol version 2.0, remote software version OpenSSH_8.0
debug1: match: OpenSSH_8.0 pat OpenSSH* compat 0x04000000
debug2: fd 3 setting O_NONBLOCK
debug1: Authenticating to odroid:1971 as 'krb'
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug2: local client KEXINIT proposal
debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,ext-info-c
debug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa
debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com
debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com
debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: compression ctos: none,zlib@openssh.com,zlib
debug2: compression stoc: none,zlib@openssh.com,zlib
debug2: languages ctos:
debug2: languages stoc:
debug2: first_kex_follows 0
debug2: reserved 0
debug2: peer server KEXINIT proposal
debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1
debug2: host key algorithms: rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256,ssh-ed25519
debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com
debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com
debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: compression ctos: none,zlib@openssh.com
debug2: compression stoc: none,zlib@openssh.com
debug2: languages ctos:
debug2: languages stoc:
debug2: first_kex_follows 0
debug2: reserved 0
debug1: kex: algorithm: curve25519-sha256
debug1: kex: host key algorithm: ecdsa-sha2-nistp256
debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none
debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none
debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
debug1: Server host key: ecdsa-sha2-nistp256 SHA256:q2xDapqWazFzMCfiAN+POvrgXomjCtB8AyewNlAmhLM
debug1: Host '[odroid]:1971' is known and matches the ECDSA host key.
debug1: Found key in /home/krb/.ssh/known_hosts:8
debug2: set_newkeys: mode 1
debug1: rekey out after 134217728 blocks
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug1: SSH2_MSG_NEWKEYS received
debug2: set_newkeys: mode 0
debug1: rekey in after 134217728 blocks
debug1: Will attempt key: /home/krb/.ssh/id_rsa RSA SHA256:HODFt6eO7TLhMCHZ3jQVB4fZMDNs4wi6bKCuSIB0MgI
debug1: Will attempt key: /home/krb/.ssh/id_dsa
debug1: Will attempt key: /home/krb/.ssh/id_ecdsa
debug1: Will attempt key: /home/krb/.ssh/id_ed25519
debug1: Will attempt key: /home/krb/.ssh/id_xmss
debug2: pubkey_prepare: done
debug1: SSH2_MSG_EXT_INFO received
debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521>
debug2: service_accept: ssh-userauth
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug1: Authentications that can continue: publickey,password,keyboard-interactive
debug1: Next authentication method: publickey
debug1: Offering public key: /home/krb/.ssh/id_rsa RSA SHA256:HODFt6eO7TLhMCHZ3jQVB4fZMDNs4wi6bKCuSIB0MgI
debug2: we sent a publickey packet, wait for reply
debug1: Server accepts key: /home/krb/.ssh/id_rsa RSA SHA256:HODFt6eO7TLhMCHZ3jQVB4fZMDNs4wi6bKCuSIB0MgI
debug1: Authentication succeeded (publickey).
Authenticated to odroid ([192.168.1.9]:1971).
debug1: channel 0: new [client-session]
debug2: channel 0: send open
debug1: Requesting no-more-sessions@openssh.com
debug1: Entering interactive session.
debug1: pledge: network
client_loop: send disconnect: Broken pipe

')

Solution was to roll back to openssl 1.1.1.c-1
whatshisname
 
Posts: 19
Joined: Sat Sep 29, 2012 5:45 pm

Re: Upgrade to openssl 1.1.1.d-1 kills all login attempts

Postby karog » Fri Sep 13, 2019 1:43 am

FYI, openssl 1.1.1.d-1 works fine on my odroids XU4 and N2. Also my PogoPlug E02.
karog
 
Posts: 304
Joined: Thu Jan 05, 2012 7:55 pm

Re: Upgrade to openssl 1.1.1.d-1 kills all login attempts

Postby graysky » Sat Sep 14, 2019 12:13 am

Works on several RPi3 and 4s... armv7h. Not sure what you're running.
graysky
Developer
 
Posts: 1872
Joined: Sun Jun 26, 2011 6:56 am
Location: /run/user/1000

Re: Upgrade to openssl 1.1.1.d-1 kills all login attempts

Postby whatshisname » Sat Sep 14, 2019 12:47 am

Thanks for the feedback. I'm running an up to date version of Arch on an Odroid C1, armv7h..

Good to know no one else is having this problem. I'll dig deeper to see where the problem might lie on my system.
whatshisname
 
Posts: 19
Joined: Sat Sep 29, 2012 5:45 pm

Re: Upgrade to openssl 1.1.1.d-1 kills all login attempts

Postby windozupdat3 » Sat Sep 14, 2019 4:44 am

$this->bbcode_second_pass_quote('whatshisname', '
')Good to know no one else is having this problem.

Yes we are: viewtopic.php?f=60&t=13973&sid=fc9c592176e7c801cc607b2a288a6750#p62137
windozupdat3
 
Posts: 43
Joined: Tue Aug 29, 2017 9:07 am

Re: Upgrade to openssl 1.1.1.d-1 kills all login attempts

Postby whatshisname » Sat Sep 14, 2019 3:26 pm

Ah! Thanks for chiming in.

I just got through carefully upgrading to d-1 again while remaining logged in so I could test the connection.

Nothing has changed. So I downgraded again.

In the meantime, I checked my sshd_config to make sure all looked good there and it did.

The only slightly out of the ordinary thing I'm doing in sshd is using an alternate port from 22.

I guess I'll wait for the next upgrade before trying it again.
whatshisname
 
Posts: 19
Joined: Sat Sep 29, 2012 5:45 pm

Re: Upgrade to openssl 1.1.1.d-1 kills all login attempts

Postby slydder » Sun Sep 15, 2019 9:15 am

I'm afraid somehow it's related to the kernel of the Odroid-C1 which is kind of old.
I've searched a lot of the problem and it seems to manifest only on our C1.
slydder
 
Posts: 35
Joined: Sat Dec 05, 2015 11:40 am

Re: Upgrade to openssl 1.1.1.d-1 kills all login attempts

Postby graysky » Sun Sep 15, 2019 10:06 am

This is ultimately why my ODROID-C2 is sitting in a drawer. The older kernel requirement causes too many quirks relating to networking in my use case. Too much frustration and wasted time. I am now running a RPi4 in its place without issue.
graysky
Developer
 
Posts: 1872
Joined: Sun Jun 26, 2011 6:56 am
Location: /run/user/1000

Re: Upgrade to openssl 1.1.1.d-1 kills all login attempts

Postby windozupdat3 » Sun Sep 15, 2019 5:59 pm

So, there is no solution apart from upgrading the package?
windozupdat3
 
Posts: 43
Joined: Tue Aug 29, 2017 9:07 am

Re: Upgrade to openssl 1.1.1.d-1 kills all login attempts

Postby slydder » Mon Sep 16, 2019 7:22 am

Downgrading the package is not a solution under Arch because sooner or "much sooner" we will brake another package. Any chance to report the bug to the package maintainer?
slydder
 
Posts: 35
Joined: Sat Dec 05, 2015 11:40 am

Next

Return to Packages

Who is online

Users browsing this forum: No registered users and 10 guests