<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: sftp with chroot connection closed in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/sftp-with-chroot-connection-closed/m-p/4198680#M733795</link>
    <description>I had reviewed this note before, thats why I Upgraded the Secure shell version.</description>
    <pubDate>Thu, 15 May 2008 16:37:04 GMT</pubDate>
    <dc:creator>Enrique Valencia</dc:creator>
    <dc:date>2008-05-15T16:37:04Z</dc:date>
    <item>
      <title>sftp with chroot connection closed</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sftp-with-chroot-connection-closed/m-p/4198678#M733793</link>
      <description>Hi!. I have a user in /etc/passwd &lt;BR /&gt;bancomer:*:500:200:chrooted user:/home/banco_d/./home/bancomer:/opt/ssh/etc/sftponly&lt;BR /&gt;&lt;BR /&gt;The ftponly shell is:&lt;BR /&gt;&lt;BR /&gt;#!/bin/sh&lt;BR /&gt;# The shell used here must be /bin/sh&lt;BR /&gt;# Shell arguments must be -c /opt/ssh/libexec/sftp-server&lt;BR /&gt;if [ "$1" != "-c" -o "$2" != "/opt/ssh/libexec/sftp-server" ]&lt;BR /&gt;then&lt;BR /&gt;echo "Error: sftpshell only runs the sftp-server program."&lt;BR /&gt;exit 1&lt;BR /&gt;fi&lt;BR /&gt;&lt;BR /&gt;shift 2&lt;BR /&gt;/opt/ssh/libexec/sftp-server $*&lt;BR /&gt;&lt;BR /&gt;I used the script to configure chrooted user (supplied from HP Secure ssh):&lt;BR /&gt;ssh_chroot_setup.sh &lt;BR /&gt;&lt;BR /&gt;When I tried to do a connection, it says "Connection Closed"!!!!!!!!!!!!!!&lt;BR /&gt;&lt;BR /&gt;The sftponly is in the directories /home/bancomer/opt/ssh/etc and /home/bancomer/bin; if I remove the chroot, it works fine!!!!&lt;BR /&gt;&lt;BR /&gt;I upgraded the version of the Secure Shell to Secure_Shell          A.04.70.021    HP-UX Secure Shell&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;This is the sftp -vvv:&lt;BR /&gt;# sftp -vvv  bancomer@lfmxh49&lt;BR /&gt;Connecting to lfmxh49...&lt;BR /&gt;OpenSSH_4.4p1-hpn12v11, OpenSSL 0.9.7l 28 Sep 2006&lt;BR /&gt;HP-UX Secure Shell-A.04.40.006, HP-UX Secure Shell version&lt;BR /&gt;debug1: Reading configuration data /opt/ssh/etc/ssh_config&lt;BR /&gt;debug3: Seeding PRNG from /opt/ssh/libexec/ssh-rand-helper&lt;BR /&gt;debug2: ssh_connect: needpriv 0&lt;BR /&gt;debug1: Connecting to lfmxh49 [170.2.1.9] port 22.&lt;BR /&gt;debug1: Connection established.&lt;BR /&gt;debug1: permanently_set_uid: 0/3&lt;BR /&gt;debug1: identity file /.ssh/id_rsa type -1&lt;BR /&gt;debug3: Not a RSA1 key file /.ssh/id_dsa.&lt;BR /&gt;debug2: key_type_from_name: unknown key type '-----BEGIN'&lt;BR /&gt;debug3: key_read: missing keytype&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug3: key_read: missing whitespace&lt;BR /&gt;debug2: key_type_from_name: unknown key type '-----END'&lt;BR /&gt;debug3: key_read: missing keytype&lt;BR /&gt;debug1: identity file /.ssh/id_dsa type 2&lt;BR /&gt;debug1: Remote protocol version 2.0, remote software version OpenSSH_4.7p1+sftp&lt;BR /&gt;ilecontrol-v1.2-hpn12v17&lt;BR /&gt;debug1: match: OpenSSH_4.7p1+sftpfilecontrol-v1.2-hpn12v17 pat OpenSSH*&lt;BR /&gt;debug1: Enabling compatibility mode for protocol 2.0&lt;BR /&gt;debug1: Local version string SSH-2.0-OpenSSH_4.4p1-hpn12v11&lt;BR /&gt;debug2: fd 4 setting O_NONBLOCK&lt;BR /&gt;debug3: RNG is ready, skipping seeding&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT sent&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT received&lt;BR /&gt;debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-&lt;BR /&gt;roup-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1&lt;BR /&gt;debug2: kex_parse_kexinit: ssh-rsa,ssh-dss&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour&lt;BR /&gt;28,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-&lt;BR /&gt;tr,aes192-ctr,aes256-ctr&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour&lt;BR /&gt;28,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-&lt;BR /&gt;tr,aes192-ctr,aes256-ctr&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@ope&lt;BR /&gt;ssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@ope&lt;BR /&gt;debug1: Connection established.&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit: first_kex_follows 0&lt;BR /&gt;debug2: kex_parse_kexinit: reserved 0&lt;BR /&gt;debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-&lt;BR /&gt;roup-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1&lt;BR /&gt;debug2: kex_parse_kexinit: ssh-rsa,ssh-dss&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour&lt;BR /&gt;28,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-&lt;BR /&gt;tr,aes192-ctr,aes256-ctr&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour&lt;BR /&gt;28,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-&lt;BR /&gt;tr,aes192-ctr,aes256-ctr&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd16&lt;BR /&gt;,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd16&lt;BR /&gt;,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib@openssh.com&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib@openssh.com&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit: first_kex_follows 0&lt;BR /&gt;debug2: kex_parse_kexinit: reserved 0&lt;BR /&gt;debug2: mac_init: found hmac-md5&lt;BR /&gt;debug1: kex: server-&amp;gt;client aes128-cbc hmac-md5 none&lt;BR /&gt;debug2: mac_init: found hmac-md5&lt;BR /&gt;debug1: kex: client-&amp;gt;server aes128-cbc hmac-md5 none&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024&amp;lt;1024&amp;lt;8192) sent&lt;BR /&gt;debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP&lt;BR /&gt;debug2: dh_gen_key: priv key bits set: 129/256&lt;BR /&gt;debug2: bits set: 522/1024&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_INIT sent&lt;BR /&gt;debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY&lt;BR /&gt;debug3: check_host_in_hostfile: filename /.ssh/known_hosts&lt;BR /&gt;debug3: check_host_in_hostfile: match line 1&lt;BR /&gt;debug3: check_host_in_hostfile: filename /.ssh/known_hosts&lt;BR /&gt;debug3: check_host_in_hostfile: match line 2&lt;BR /&gt;debug1: Host 'lfmxh49' is known and matches the RSA host key.&lt;BR /&gt;debug1: Found key in /.ssh/known_hosts:1&lt;BR /&gt;debug2: bits set: 482/1024&lt;BR /&gt;debug1: ssh_rsa_verify: signature correct&lt;BR /&gt;debug2: kex_derive_keys&lt;BR /&gt;debug2: set_newkeys: mode 1&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS sent&lt;BR /&gt;debug1: expecting SSH2_MSG_NEWKEYS&lt;BR /&gt;debug2: set_newkeys: mode 0&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS received&lt;BR /&gt;debug1: SSH2_MSG_SERVICE_REQUEST sent&lt;BR /&gt;debug2: service_accept: ssh-userauth&lt;BR /&gt;debug1: SSH2_MSG_SERVICE_ACCEPT received&lt;BR /&gt;debug2: key: /.ssh/id_rsa (0)&lt;BR /&gt;debug2: key: /.ssh/id_dsa (4002ef70)&lt;BR /&gt;debug1: Authentications that can continue: publickey,password,keyboard-interact&lt;BR /&gt;ve&lt;BR /&gt;debug3: start over, passed a different list publickey,password,keyboard-interac&lt;BR /&gt;ive&lt;BR /&gt;debug3: preferred publickey,keyboard-interactive,password&lt;BR /&gt;debug3: authmethod_lookup publickey&lt;BR /&gt;debug3: remaining preferred: keyboard-interactive,password&lt;BR /&gt;debug3: authmethod_is_enabled publickey&lt;BR /&gt;debug1: Next authentication method: publickey&lt;BR /&gt;debug1: Trying private key: /.ssh/id_rsa&lt;BR /&gt;debug3: no such identity: /.ssh/id_rsa&lt;BR /&gt;debug1: Offering public key: /.ssh/id_dsa&lt;BR /&gt;debug3: send_pubkey_test&lt;BR /&gt;debug2: we sent a publickey packet, wait for reply&lt;BR /&gt;debug1: Authentications that can continue: publickey,password,keyboard-interact&lt;BR /&gt;ve&lt;BR /&gt;debug2: we did not send a packet, disable method&lt;BR /&gt;debug3: authmethod_lookup keyboard-interactive&lt;BR /&gt;debug3: remaining preferred: password&lt;BR /&gt;debug3: authmethod_is_enabled keyboard-interactive&lt;BR /&gt;debug1: Next authentication method: keyboard-interactive&lt;BR /&gt;debug2: userauth_kbdint&lt;BR /&gt;debug2: we sent a keyboard-interactive packet, wait for reply&lt;BR /&gt;debug2: input_userauth_info_req&lt;BR /&gt;debug2: input_userauth_info_req: num_prompts 1&lt;BR /&gt;Password:&lt;BR /&gt;debug3: packet_send2: adding 32 (len 21 padlen 11 extra_pad 64)&lt;BR /&gt;debug2: input_userauth_info_req&lt;BR /&gt;debug2: input_userauth_info_req: num_prompts 0&lt;BR /&gt;debug3: packet_send2: adding 48 (len 10 padlen 6 extra_pad 64)&lt;BR /&gt;debug1: Authentication succeeded (keyboard-interactive).&lt;BR /&gt;debug2: fd 5 setting O_NONBLOCK&lt;BR /&gt;debug2: fd 6 setting O_NONBLOCK&lt;BR /&gt;debug1: Final hpn_buffer_size = 131072&lt;BR /&gt;debug1: channel 0: new [client-session]&lt;BR /&gt;debug3: ssh_session2_open: channel_new: 0&lt;BR /&gt;debug2: channel 0: send open&lt;BR /&gt;debug1: Entering interactive session.&lt;BR /&gt;debug2: callback start&lt;BR /&gt;debug2: client_session2_setup: id 0&lt;BR /&gt;debug1: Sending subsystem: sftp&lt;BR /&gt;debug2: channel 0: request subsystem confirm 1&lt;BR /&gt;debug2: fd 4 setting TCP_NODELAY&lt;BR /&gt;debug2: callback done&lt;BR /&gt;debug2: channel 0: open confirm rwindow 0 rmax 32768&lt;BR /&gt;debug2: tcpwinsz: 32768 for connection: 4&lt;BR /&gt;debug2: channel 0: rcvd adjust 131072&lt;BR /&gt;debug2: channel 0: rcvd eof&lt;BR /&gt;debug2: channel 0: output open -&amp;gt; drain&lt;BR /&gt;debug2: channel 0: obuf empty&lt;BR /&gt;debug2: channel 0: close_write&lt;BR /&gt;debug2: channel 0: output drain -&amp;gt; closed&lt;BR /&gt;debug1: client_input_channel_req: channel 0 rtype exit-status reply 0&lt;BR /&gt;debug2: channel 0: rcvd close&lt;BR /&gt;debug2: channel 0: close_read&lt;BR /&gt;debug2: channel 0: input open -&amp;gt; closed&lt;BR /&gt;debug3: channel 0: will not send data after close&lt;BR /&gt;debug2: channel 0: almost dead&lt;BR /&gt;debug2: channel 0: gc: notify user&lt;BR /&gt;debug2: channel 0: gc: user detached&lt;BR /&gt;debug2: channel 0: send close&lt;BR /&gt;debug2: channel 0: is dead&lt;BR /&gt;debug2: channel 0: garbage collecting&lt;BR /&gt;debug1: channel 0: free: client-session, nchannels 1&lt;BR /&gt;debug3: channel 0: status: The following connections are open:&lt;BR /&gt;  #0 client-session (t4 r0 i3/0 o3/0 fd -1/-1 cfd -1)&lt;BR /&gt;&lt;BR /&gt;debug3: channel 0: close_fds r -1 w -1 e 7 c -1&lt;BR /&gt;debug1: fd 0 clearing O_NONBLOCK&lt;BR /&gt;debug1: fd 1 clearing O_NONBLOCK&lt;BR /&gt;debug1: Transferred: stdin 0, stdout 0, stderr 0 bytes in 0.1 seconds&lt;BR /&gt;debug1: Bytes per second: stdin 0.0, stdout 0.0, stderr 0.0&lt;BR /&gt;debug1: Exit status 141&lt;BR /&gt;Connection closed&lt;BR /&gt;&lt;BR /&gt;This is the /var/adm/syslog/syslog.log&lt;BR /&gt;&lt;BR /&gt;May 15 11:16:22 lfmxh49 sshd[20552]: Accepted keyboard-interactive/pam for banco&lt;BR /&gt;mer from 128.2.0.10 port 51188 ssh2&lt;BR /&gt;May 15 11:17:44 lfmxh49 sshd[20593]: Accepted keyboard-interactive/pam for banco&lt;BR /&gt;mer from 128.2.0.10 port 51197 ssh2&lt;BR /&gt;May 15 11:17:52 lfmxh49 sshd[20601]: Accepted keyboard-interactive/pam for banco&lt;BR /&gt;mer from 128.2.0.10 port 51201 ssh2&lt;BR /&gt;May 15 11:18:20 lfmxh49 sshd[20618]: Accepted keyboard-interactive/pam for banco&lt;BR /&gt;mer from 128.2.0.10 port 51205 ssh2&lt;BR /&gt;May 15 11:28:25 lfmxh49 sshd[20955]: Accepted keyboard-interactive/pam for banco&lt;BR /&gt;mer from 128.2.0.10 port 51296 ssh2&lt;BR /&gt;&lt;BR /&gt;What else can I do? !!!!!!!!!</description>
      <pubDate>Thu, 15 May 2008 15:45:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sftp-with-chroot-connection-closed/m-p/4198678#M733793</guid>
      <dc:creator>Enrique Valencia</dc:creator>
      <dc:date>2008-05-15T15:45:15Z</dc:date>
    </item>
    <item>
      <title>Re: sftp with chroot connection closed</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sftp-with-chroot-connection-closed/m-p/4198679#M733794</link>
      <description>Hi&lt;BR /&gt;&lt;BR /&gt;Looks like possible error in&lt;BR /&gt;&lt;A href="http://forums12.itrc.hp.com/service/forums/questionanswer.do?admit=109447627+1210870319864+28353475&amp;amp;threadId=812036" target="_blank"&gt;http://forums12.itrc.hp.com/service/forums/questionanswer.do?admit=109447627+1210870319864+28353475&amp;amp;threadId=812036&lt;/A&gt;</description>
      <pubDate>Thu, 15 May 2008 15:55:26 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sftp-with-chroot-connection-closed/m-p/4198679#M733794</guid>
      <dc:creator>Jeeshan</dc:creator>
      <dc:date>2008-05-15T15:55:26Z</dc:date>
    </item>
    <item>
      <title>Re: sftp with chroot connection closed</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sftp-with-chroot-connection-closed/m-p/4198680#M733795</link>
      <description>I had reviewed this note before, thats why I Upgraded the Secure shell version.</description>
      <pubDate>Thu, 15 May 2008 16:37:04 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sftp-with-chroot-connection-closed/m-p/4198680#M733795</guid>
      <dc:creator>Enrique Valencia</dc:creator>
      <dc:date>2008-05-15T16:37:04Z</dc:date>
    </item>
    <item>
      <title>Re: sftp with chroot connection closed</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sftp-with-chroot-connection-closed/m-p/4198681#M733796</link>
      <description>Hi Enrique,&lt;BR /&gt;&lt;BR /&gt;Take a look at my post at your previous thread - &lt;A href="http://forums12.itrc.hp.com/service/forums/questionanswer.do?threadId=1231529" target="_blank"&gt;http://forums12.itrc.hp.com/service/forums/questionanswer.do?threadId=1231529&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Your ssh version is - HP-UX Secure Shell-A.04.40.006, HP-UX Secure Shell version&lt;BR /&gt;&lt;BR /&gt;Upgrade to newer one.&lt;BR /&gt;&lt;BR /&gt;regards,&lt;BR /&gt;ivan</description>
      <pubDate>Thu, 15 May 2008 16:44:14 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sftp-with-chroot-connection-closed/m-p/4198681#M733796</guid>
      <dc:creator>Ivan Krastev</dc:creator>
      <dc:date>2008-05-15T16:44:14Z</dc:date>
    </item>
    <item>
      <title>Re: sftp with chroot connection closed</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sftp-with-chroot-connection-closed/m-p/4198682#M733797</link>
      <description>Hi Ivan:&lt;BR /&gt;&lt;BR /&gt;I upgraded the HP Secure Shell in the server, in fact, I did a test in the local host, and It doesn't work.&lt;BR /&gt;&lt;BR /&gt;I have the same error.&lt;BR /&gt;&lt;BR /&gt;lfmxh49/home/bancomer_d&amp;gt;# sftp -vvv bancomer@localhost&lt;BR /&gt;Connecting to localhost...&lt;BR /&gt;OpenSSH_4.7p1+sftpfilecontrol-v1.2-hpn12v17, OpenSSL 0.9.7m 23 Feb 2007&lt;BR /&gt;HP-UX Secure Shell-A.04.70.021, HP-UX Secure Shell version&lt;BR /&gt;debug1: Reading configuration data /opt/ssh/etc/ssh_config&lt;BR /&gt;debug3: RNG is ready, skipping seeding&lt;BR /&gt;debug2: ssh_connect: needpriv 0&lt;BR /&gt;debug1: Connecting to localhost [127.0.0.1] port 22.&lt;BR /&gt;debug1: Connection established.&lt;BR /&gt;debug1: permanently_set_uid: 0/3&lt;BR /&gt;debug1: identity file /.ssh/id_rsa type -1&lt;BR /&gt;debug1: identity file /.ssh/id_dsa type -1&lt;BR /&gt;debug1: Remote protocol version 2.0, remote software version OpenSSH_4.7p1+sftpf&lt;BR /&gt;ilecontrol-v1.2-hpn12v17&lt;BR /&gt;debug1: match: OpenSSH_4.7p1+sftpfilecontrol-v1.2-hpn12v17 pat OpenSSH*&lt;BR /&gt;debug1: Enabling compatibility mode for protocol 2.0&lt;BR /&gt;debug1: Local version string SSH-2.0-OpenSSH_4.7p1+sftpfilecontrol-v1.2-hpn12v17&lt;BR /&gt;debug2: fd 4 setting O_NONBLOCK&lt;BR /&gt;debug3: RNG is ready, skipping seeding&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT sent&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT received&lt;BR /&gt;debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-g&lt;BR /&gt;roup-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1&lt;BR /&gt;debug2: kex_parse_kexinit: ssh-rsa,ssh-dss&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour1&lt;BR /&gt;28,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-c&lt;BR /&gt;tr,aes192-ctr,aes256-ctr&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour1&lt;BR /&gt;28,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-c&lt;BR /&gt;tr,aes192-ctr,aes256-ctr&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160&lt;BR /&gt;,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160&lt;BR /&gt;,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit: first_kex_follows 0&lt;BR /&gt;debug2: kex_parse_kexinit: reserved 0&lt;BR /&gt;debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-g&lt;BR /&gt;roup-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1&lt;BR /&gt;debug2: kex_parse_kexinit: ssh-rsa,ssh-dss&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour1&lt;BR /&gt;28,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-c&lt;BR /&gt;tr,aes192-ctr,aes256-ctr&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour1&lt;BR /&gt;28,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-c&lt;BR /&gt;tr,aes192-ctr,aes256-ctr&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160&lt;BR /&gt;,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160&lt;BR /&gt;,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib@openssh.com&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib@openssh.com&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit: first_kex_follows 0&lt;BR /&gt;debug2: kex_parse_kexinit: reserved 0&lt;BR /&gt;debug2: mac_setup: found hmac-md5&lt;BR /&gt;debug1: kex: server-&amp;gt;client aes128-cbc hmac-md5 none&lt;BR /&gt;debug2: mac_setup: found hmac-md5&lt;BR /&gt;debug1: kex: client-&amp;gt;server aes128-cbc hmac-md5 none&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024&amp;lt;1024&amp;lt;8192) sent&lt;BR /&gt;debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP&lt;BR /&gt;debug2: dh_gen_key: priv key bits set: 125/256&lt;BR /&gt;debug2: bits set: 503/1024&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_INIT sent&lt;BR /&gt;debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY&lt;BR /&gt;debug3: check_host_in_hostfile: filename /.ssh/known_hosts&lt;BR /&gt;debug3: check_host_in_hostfile: match line 8&lt;BR /&gt;debug1: Host 'localhost' is known and matches the RSA host key.&lt;BR /&gt;debug1: Found key in /.ssh/known_hosts:8&lt;BR /&gt;debug2: bits set: 501/1024&lt;BR /&gt;debug1: ssh_rsa_verify: signature correct&lt;BR /&gt;debug2: kex_derive_keys&lt;BR /&gt;debug2: set_newkeys: mode 1&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS sent&lt;BR /&gt;debug1: expecting SSH2_MSG_NEWKEYS&lt;BR /&gt;debug2: set_newkeys: mode 0&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS received&lt;BR /&gt;debug1: SSH2_MSG_SERVICE_REQUEST sent&lt;BR /&gt;debug2: service_accept: ssh-userauth&lt;BR /&gt;debug1: SSH2_MSG_SERVICE_ACCEPT received&lt;BR /&gt;debug2: key: /.ssh/id_rsa (0)&lt;BR /&gt;debug2: key: /.ssh/id_dsa (0)&lt;BR /&gt;debug1: Authentications that can continue: publickey,password,keyboard-interacti&lt;BR /&gt;ve&lt;BR /&gt;debug3: start over, passed a different list publickey,password,keyboard-interact&lt;BR /&gt;ive&lt;BR /&gt;debug3: preferred publickey,keyboard-interactive,password&lt;BR /&gt;debug3: authmethod_lookup publickey&lt;BR /&gt;debug3: remaining preferred: keyboard-interactive,password&lt;BR /&gt;debug3: authmethod_is_enabled publickey&lt;BR /&gt;debug1: Next authentication method: publickey&lt;BR /&gt;debug1: Trying private key: /.ssh/id_rsa&lt;BR /&gt;debug3: no such identity: /.ssh/id_rsa&lt;BR /&gt;debug1: Trying private key: /.ssh/id_dsa&lt;BR /&gt;debug3: no such identity: /.ssh/id_dsa&lt;BR /&gt;debug2: we did not send a packet, disable method&lt;BR /&gt;debug3: authmethod_lookup keyboard-interactive&lt;BR /&gt;debug3: remaining preferred: password&lt;BR /&gt;debug3: authmethod_is_enabled keyboard-interactive&lt;BR /&gt;debug1: Next authentication method: keyboard-interactive&lt;BR /&gt;debug2: userauth_kbdint&lt;BR /&gt;debug2: we sent a keyboard-interactive packet, wait for reply&lt;BR /&gt;debug2: input_userauth_info_req&lt;BR /&gt;debug2: input_userauth_info_req: num_prompts 1&lt;BR /&gt;Password:&lt;BR /&gt;debug3: packet_send2: adding 32 (len 21 padlen 11 extra_pad 64)&lt;BR /&gt;debug2: input_userauth_info_req&lt;BR /&gt;debug2: input_userauth_info_req: num_prompts 0&lt;BR /&gt;debug3: packet_send2: adding 48 (len 10 padlen 6 extra_pad 64)&lt;BR /&gt;debug1: Authentication succeeded (keyboard-interactive).&lt;BR /&gt;debug2: fd 5 setting O_NONBLOCK&lt;BR /&gt;debug2: fd 6 setting O_NONBLOCK&lt;BR /&gt;debug1: Final hpn_buffer_size = 131072&lt;BR /&gt;debug1: channel 0: new [client-session]&lt;BR /&gt;debug3: ssh_session2_open: channel_new: 0&lt;BR /&gt;debug2: channel 0: send open&lt;BR /&gt;debug1: Entering interactive session.&lt;BR /&gt;debug2: callback start&lt;BR /&gt;debug2: client_session2_setup: id 0&lt;BR /&gt;debug1: Sending subsystem: sftp&lt;BR /&gt;debug2: channel 0: request subsystem confirm 1&lt;BR /&gt;debug2: fd 4 setting TCP_NODELAY&lt;BR /&gt;debug2: callback done&lt;BR /&gt;debug2: channel 0: open confirm rwindow 0 rmax 32768&lt;BR /&gt;debug2: tcpwinsz: 32768 for connection: 4&lt;BR /&gt;debug2: channel 0: rcvd adjust 131072&lt;BR /&gt;debug2: channel 0: rcvd eof&lt;BR /&gt;debug2: channel 0: output open -&amp;gt; drain&lt;BR /&gt;debug2: channel 0: obuf empty&lt;BR /&gt;debug2: channel 0: close_write&lt;BR /&gt;debug2: channel 0: output drain -&amp;gt; closed&lt;BR /&gt;debug1: client_input_channel_req: channel 0 rtype exit-status reply 0&lt;BR /&gt;debug2: channel 0: rcvd close&lt;BR /&gt;debug2: channel 0: close_read&lt;BR /&gt;debug2: channel 0: input open -&amp;gt; closed&lt;BR /&gt;debug3: channel 0: will not send data after close&lt;BR /&gt;debug2: channel 0: almost dead&lt;BR /&gt;debug2: channel 0: gc: notify user&lt;BR /&gt;debug2: channel 0: gc: user detached&lt;BR /&gt;debug2: channel 0: send close&lt;BR /&gt;debug2: channel 0: is dead&lt;BR /&gt;debug2: channel 0: garbage collecting&lt;BR /&gt;debug1: channel 0: free: client-session, nchannels 1&lt;BR /&gt;debug3: channel 0: status: The following connections are open:&lt;BR /&gt;  #0 client-session (t4 r0 i3/0 o3/0 fd -1/-1 cfd -1)&lt;BR /&gt;&lt;BR /&gt;debug3: channel 0: close_fds r -1 w -1 e 7 c -1&lt;BR /&gt;debug1: fd 0 clearing O_NONBLOCK&lt;BR /&gt;debug1: fd 1 clearing O_NONBLOCK&lt;BR /&gt;debug1: Transferred: stdin 0, stdout 0, stderr 0 bytes in 0.1 seconds&lt;BR /&gt;debug1: Bytes per second: stdin 0.0, stdout 0.0, stderr 0.0&lt;BR /&gt;debug1: Exit status 141&lt;BR /&gt;Connection closed</description>
      <pubDate>Thu, 15 May 2008 16:53:38 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sftp-with-chroot-connection-closed/m-p/4198682#M733797</guid>
      <dc:creator>Enrique Valencia</dc:creator>
      <dc:date>2008-05-15T16:53:38Z</dc:date>
    </item>
  </channel>
</rss>

