curl-library
Re: Core dump when authentication fails?
Date: Fri, 27 May 2011 11:17:31 -0400
>
>
> What libssh2 version is this? Does keyboard-interactive auth work against
> this server?
>
> libssh2-1.2.8
The same program works fine with the correct password.
Yes, I can do a scp to this server from the command line and it works.
>
> I figure a "quick" check would be to make sure the libssh2 code doesn't try
> to malloc anything if that length is zero. See the attachment for a
> suggested approach.
>
>
Thanks for your patch to libssh2. I tried it. Unfortunately, the result was
a core dump at the same line. Here is the relevant dbx output:
(dbx) where
current thread: t_at_1
dbx: internal warning: Visiting state accessed while locked
dbx: internal warning: Visiting state accessed while locked
dbx: internal warning: Visiting state accessed while locked
dbx: internal warning: Visiting state accessed while locked
dbx: internal warning: Visiting state accessed while locked
dbx: internal warning: Visiting state accessed while locked
dbx: internal warning: Visiting state accessed while locked
dbx: internal warning: Visiting state accessed while locked
dbx: internal warning: Visiting state accessed while locked
dbx: internal warning: Visiting state accessed while locked
dbx: internal warning: Visiting state accessed while locked
dbx: internal warning: Visiting state accessed while locked
dbx: internal warning: Visiting state accessed while locked
dbx: internal warning: Visiting state accessed while locked
dbx: internal warning: Visiting state accessed while locked
dbx: internal warning: Visiting state accessed while locked
dbx: warning: can't find file
"/home/sali/patch_for_userauth/zSFTP_Prototype.C"
dbx: warning: see `help finding-files'
dbx: warning: can't find file
"/home/sali/patch_for_userauth/zSFTP_Prototype.C"
[1] __lwp_kill(0x0, 0x6, 0x0, 0x6, 0xffbffeff, 0x0), at 0xfeccc5f8
[2] raise(0x6, 0x0, 0x0, 0xfecabf18, 0xffffffff, 0x6), at 0xfec65a5c
[3] abort(0xffbfe778, 0x1, 0xfed313ac, 0xeeb60, 0xfed333d8, 0x0), at
0xfec4194c
[4] __assert(0xff30e654, 0xff30e664, 0x88, 0x80ae8, 0xee87c, 0xff3418f8),
at 0xfec41b88
=>[5] curl_domalloc(wantedsize = 0, line = 308, source = 0xff310d18
"ssh.c"), line 136 in "memdebug.c"
[6] my_libssh2_malloc(count = 0, abstract = 0x73d10), line 308 in "ssh.c"
[7] userauth_keyboard_interactive(session = 0x73d10, username = 0x27118
"lis", username_len = 3U, response_callback = 0xff1aa958 =
&`libcurl.so.4.2.0`ssh.c`kbd_callback(const char *name, int name_len, const
char *instruction, int instruction_len, int num_prompts, const
LIBSSH2_USERAUTH_KBDINT_PROMPT *prompts, LIBSSH2_USERAUTH_KBDINT_RESPONSE
*responses, void **abstract)), line 1489 in "userauth.c"
[8] libssh2_userauth_keyboard_interactive_ex(session = 0x73d10, user =
0x27118 "lis", user_len = 3U, response_callback = 0xff1aa958 =
&`libcurl.so.4.2.0`ssh.c`kbd_callback(const char *name, int name_len, const
char *instruction, int instruction_len, int num_prompts, const
LIBSSH2_USERAUTH_KBDINT_PROMPT *prompts, LIBSSH2_USERAUTH_KBDINT_RESPONSE
*responses, void **abstract)), line 1682 in "userauth.c"
[9] ssh_statemach_act(conn = 0x70e38, block = 0xffbff040), line 905 in
"ssh.c"
[10] ssh_multi_statemach(conn = 0x70e38, done = 0xffbff164), line 2481 in
"ssh.c"
[11] Curl_protocol_connecting(conn = 0x70e38, done = 0xffbff164), line
3259 in "url.c"
[12] multi_runsingle(multi = 0x4e358, now = RECORD, easy = 0x4a3c0), line
1188 in "multi.c"
[13] curl_multi_perform(multi_handle = 0x4e358, running_handles =
0xffbff2d0), line 1712 in "multi.c"
[14] main(), at 0x12e0c
-------------------------------------------------------------------
List admin: http://cool.haxx.se/list/listinfo/curl-library
Etiquette: http://curl.haxx.se/mail/etiquette.html
Received on 2011-05-27