From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-8.8 required=3.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, MENTIONS_GIT_HOSTING,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 51F56C4363A for ; Mon, 5 Oct 2020 08:40:00 +0000 (UTC) Received: from lists.ozlabs.org (lists.ozlabs.org [203.11.71.2]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 0248920578 for ; Mon, 5 Oct 2020 08:39:58 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (1024-bit key) header.d=HCL.COM header.i=@HCL.COM header.b="TM1gkON7"; dkim=pass (1024-bit key) header.d=HCL.COM header.i=@HCL.COM header.b="TM1gkON7" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 0248920578 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=hcl.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=openbmc-bounces+openbmc=archiver.kernel.org@lists.ozlabs.org Received: from bilbo.ozlabs.org (lists.ozlabs.org [IPv6:2401:3900:2:1::3]) by lists.ozlabs.org (Postfix) with ESMTP id 4C4Yv075CHzDq9D for ; Mon, 5 Oct 2020 19:39:56 +1100 (AEDT) Authentication-Results: lists.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=hcl.com (client-ip=40.107.131.122; helo=apc01-sg2-obe.outbound.protection.outlook.com; envelope-from=jayashree-d@hcl.com; receiver=) Authentication-Results: lists.ozlabs.org; dmarc=pass (p=none dis=none) header.from=hcl.com Authentication-Results: lists.ozlabs.org; dkim=pass (1024-bit key; unprotected) header.d=HCL.COM header.i=@HCL.COM header.a=rsa-sha256 header.s=selector2 header.b=TM1gkON7; dkim=pass (1024-bit key) header.d=HCL.COM header.i=@HCL.COM header.a=rsa-sha256 header.s=selector2 header.b=TM1gkON7; dkim-atps=neutral Received: from APC01-SG2-obe.outbound.protection.outlook.com (mail-eopbgr1310122.outbound.protection.outlook.com [40.107.131.122]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by lists.ozlabs.org (Postfix) with ESMTPS id 4C4YgZ6bVgzDqFh for ; Mon, 5 Oct 2020 19:30:00 +1100 (AEDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=HCL.COM; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=JMhjrmgEliiBevVaK4ge3W3+Tk10iKCo0nDcNWt0vBc=; b=TM1gkON73+s8wMRg3wGykGEVWWYr9CjVHTPKWigGC0jKUgAWNqB9IFV1gq0DDs043mBH86Dr50FaFoyIR2iwIan70UZlgevshkqfIZvG6KiIdrGQMSe5F0C9auA3SzZJ5RsO5GuwBuGuDYFWMgLzyO2BXg5QPPtApVGF7zMS6dM= Received: from SG2PR0401CA0001.apcprd04.prod.outlook.com (2603:1096:3:1::11) by TY2PR04MB3167.apcprd04.prod.outlook.com (2603:1096:404:a0::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3433.34; Mon, 5 Oct 2020 08:29:54 +0000 Received: from SG2APC01FT054.eop-APC01.prod.protection.outlook.com (2603:1096:3:1:cafe::e5) by SG2PR0401CA0001.outlook.office365.com (2603:1096:3:1::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3433.32 via Frontend Transport; Mon, 5 Oct 2020 08:29:53 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 192.8.195.56) smtp.mailfrom=hcl.com; lists.ozlabs.org; dkim=pass (signature was verified) header.d=HCL.COM;lists.ozlabs.org; dmarc=pass action=none header.from=hcl.com; Received-SPF: Pass (protection.outlook.com: domain of hcl.com designates 192.8.195.56 as permitted sender) receiver=protection.outlook.com; client-ip=192.8.195.56; helo=APC01-PU1-obe.outbound.protection.outlook.com; Received: from APC01-PU1-obe.outbound.protection.outlook.com (192.8.195.56) by SG2APC01FT054.mail.protection.outlook.com (10.152.250.246) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3433.34 via Frontend Transport; Mon, 5 Oct 2020 08:29:52 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Kc+yqRNxspcrefkSok8/udUPlVRY0gPRkVMDrRENstsg+VyhK1Tt6KDCEQ71jwwPtMCSAQFYdMjmBGte8v6Dwx8wHLKRGdleTe6wguTxR2nFXVfP7FVQ+g8QpXtVYBWIFVp684gh7VLBwRJN57Z3aOd9CAkfMQNlF0CjUreBsPCnDQsoQaWWXOlsiFSFe+DumF8Wi50cWcdRPwYoO7FQVJ/X9SSlnsmD2BRRrV5N7XVUoGlW79lKTACbuMOKQjyYo+MOdrPr5FXFSGLsykUzzXrDnc8jRzn0d2ADTItsSEP+SRxWjJVl5St5NJ1qVAz2aBupavpVZK/OYl0NddQ5bw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=JMhjrmgEliiBevVaK4ge3W3+Tk10iKCo0nDcNWt0vBc=; b=ZbEEbIv1jgyfD2YKfpxJUNWVl4mSuCJKkl8kN2Ru2ZNou0lbZCT3q2re44Mpwci8qTEvbh47+Zi1A5SXX09Gt4SskhkN3aNMa9G+Q2H5Wq2iZ0cNFYJN3AGPlgrcjKK/xFuK5r8QWodN9dP9h0u62TDPIc0lOjDU5qkzZAVwkirjWTRxhHf3jG7YdW+k3Pa4DINLp/M8K3zHMaokhfjVKkb5g4kAIOSpzpJXgDoRMHa4HwUPZRHYoS7bgcEWXFXbS4TJxppEnoJyrd7Ruk5bbuUjwYQ/SS8n2b/riIJtXFxKbRc5R9CnRpYnxI9PHudOd1AoSEGd98MXk3sCseWDhA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=hcl.com; dmarc=pass action=none header.from=hcl.com; dkim=pass header.d=hcl.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=HCL.COM; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=JMhjrmgEliiBevVaK4ge3W3+Tk10iKCo0nDcNWt0vBc=; b=TM1gkON73+s8wMRg3wGykGEVWWYr9CjVHTPKWigGC0jKUgAWNqB9IFV1gq0DDs043mBH86Dr50FaFoyIR2iwIan70UZlgevshkqfIZvG6KiIdrGQMSe5F0C9auA3SzZJ5RsO5GuwBuGuDYFWMgLzyO2BXg5QPPtApVGF7zMS6dM= Received: from SG2PR04MB3093.apcprd04.prod.outlook.com (2603:1096:4:6d::11) by SG2PR04MB2603.apcprd04.prod.outlook.com (2603:1096:4:57::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3433.39; Mon, 5 Oct 2020 08:29:40 +0000 Received: from SG2PR04MB3093.apcprd04.prod.outlook.com ([fe80::b93f:17bd:c016:eec7]) by SG2PR04MB3093.apcprd04.prod.outlook.com ([fe80::b93f:17bd:c016:eec7%4]) with mapi id 15.20.3433.040; Mon, 5 Oct 2020 08:29:40 +0000 From: Jayashree D To: "openbmc@lists.ozlabs.org" Subject: RE: Connection issue in OpenBMC image Thread-Topic: Connection issue in OpenBMC image Thread-Index: AdaIK6vt31RmicRFTiOQBEztxwnvYACTHsXgAAMSy4AANSDeAAAFmmiAACmSOpAAPPsWAAAkyl4AAVXVjIAB/0Wa4A== Date: Mon, 5 Oct 2020 08:29:40 +0000 Message-ID: References: <68131600080119@mail.yandex-team.ru> <18221600180837@mail.yandex-team.ru> <20200917154534.GI6152@heinlein> In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-titus-metadata-40: eyJDYXRlZ29yeUxhYmVscyI6IiIsIk1ldGFkYXRhIjp7Im5zIjoiaHR0cDpcL1wvd3d3LnRpdHVzLmNvbVwvbnNcL2hjbCIsImlkIjoiN2JlZDBkNDYtMWE1My00NjJjLThhNWItNmY3NDM5ZWQ1NTk0IiwicHJvcHMiOlt7Im4iOiJIQ0xDbGFzc2lmaWNhdGlvbiIsInZhbHMiOlt7InZhbHVlIjoiSENMX0NsYTVzXzFudDNybmFsIn1dfV19LCJTdWJqZWN0TGFiZWxzIjpbXSwiVE1DVmVyc2lvbiI6IjE4LjQuMTg0My4xMjMiLCJUcnVzdGVkTGFiZWxIYXNoIjoiMFBmOFFXR3lUU1wveFwvTkZzWmJuQzhXeCtXVGhPTzNidUE5VW8zRWdlWlJJT0F0cFhpRkFGMWtHYmdYVm9Na0tBIn0= x-hclclassification: HCL_Cla5s_1nt3rnal Authentication-Results-Original: lists.ozlabs.org; dkim=none (message not signed) header.d=none;lists.ozlabs.org; dmarc=none action=none header.from=hcl.com; x-originating-ip: [2409:4072:381:c1a3:f972:360d:9d73:c99] x-ms-publictraffictype: Email X-MS-Office365-Filtering-Correlation-Id: ea320a9f-027c-4cab-e2b0-08d86908d530 x-ms-traffictypediagnostic: SG2PR04MB2603:|TY2PR04MB3167: X-Microsoft-Antispam-PRVS: x-ms-oob-tlc-oobclassifiers: OLM:10000;OLM:9508; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam-Untrusted: BCL:0; X-Microsoft-Antispam-Message-Info-Original: 3L7+giVWqExi8FdniOmBXofrQBjfn7eCoU8UdIVsw3BkrytWSrbdEWJJDKfjW9Nxv0VqRJZuLp+hKVCA2zgSh0fGf4dTB8g10KNgTOYmXdIPF6D59fQKaf9OvOlXrAfZ+O4KGM4Vaxc5yauKWOwK009pkFoz8gtoRBJqinUWd7gK5YziP0EFfreuWyUIrpAJH7wRKG9NmC4W3VvgpNJPvEXOvFkh0EwtNmwB0uYG4vk4EjJZSywFONQlHQ0jULlkyRtiPSsZYVH0u8Z/bgKwuLgK59HTsv0L8PZCYkB5DG3CvaYC3qjzTa+q8xH2qLX0Ucc8dnBrzOO77n5L0jZyVO0v5rDN9ndBk8l6jZ+2FOoPrKhLHpmK2DKdR9RP9ACQMFN5Aeid9BpS1NJfnzQVOCpO68CTyjE9LR/SkfK+reUs3jCwrPCqJL2ttW7mYHZZ8yAfZpnixL7OT4urkdZgEg== X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:SG2PR04MB3093.apcprd04.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(136003)(376002)(366004)(396003)(39860400002)(346002)(76116006)(66946007)(66556008)(64756008)(66446008)(66476007)(8936002)(83080400001)(71200400001)(4326008)(54906003)(52536014)(9686003)(6506007)(53546011)(186003)(316002)(30864003)(478600001)(8676002)(55016002)(5660300002)(966005)(7696005)(6916009)(2906002)(83380400001)(33656002)(86362001)(47845001); DIR:OUT; SFP:1102; x-ms-exchange-antispam-messagedata: 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 x-ms-exchange-transport-forked: True Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-MS-Exchange-Transport-CrossTenantHeadersStamped: SG2PR04MB2603 X-DLP: MSGProcess X-EOPAttributedMessage: 0 X-MS-Exchange-Transport-CrossTenantHeadersStripped: SG2APC01FT054.eop-APC01.prod.protection.outlook.com X-MS-Office365-Filtering-Correlation-Id-Prvs: 04b10b97-5a10-44f0-13d2-08d86908cdac X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:192.8.195.56; CTRY:IN; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:APC01-PU1-obe.outbound.protection.outlook.com; PTR:InfoDomainNonexistent; CAT:NONE; SFS:(4636009)(39860400002)(376002)(396003)(136003)(346002)(46966005)(5660300002)(70586007)(336012)(54906003)(30864003)(82740400003)(47076004)(36906005)(52536014)(26005)(6506007)(966005)(53546011)(356005)(316002)(81166007)(83080400001)(186003)(83380400001)(7696005)(70206006)(82310400003)(34020700004)(478600001)(86362001)(6916009)(4326008)(33656002)(8676002)(2906002)(9686003)(8936002)(55016002)(47845001); DIR:OUT; SFP:1102; X-OriginatorOrg: HCL.COM X-MS-Exchange-CrossTenant-OriginalArrivalTime: 05 Oct 2020 08:29:52.1465 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: ea320a9f-027c-4cab-e2b0-08d86908d530 X-MS-Exchange-CrossTenant-Id: 189de737-c93a-4f5a-8b68-6f4ca9941912 X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=189de737-c93a-4f5a-8b68-6f4ca9941912; Ip=[192.8.195.56]; Helo=[APC01-PU1-obe.outbound.protection.outlook.com] X-MS-Exchange-CrossTenant-AuthSource: SG2APC01FT054.eop-APC01.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: TY2PR04MB3167 X-BeenThere: openbmc@lists.ozlabs.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Development list for OpenBMC List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: George Keishing , "geissonator@yahoo.com" , Vijay Khemka , Konstantin Klubnichkin Errors-To: openbmc-bounces+openbmc=archiver.kernel.org@lists.ozlabs.org Sender: "openbmc" Classification: HCL Internal Regarding SSH connection, an issue has been created in openbmc and I also s= ee others having this same issue. >From the comments, I have run "dropbear -E -p 5022" in the target (UART-con= sole) and tried to connect the target using "ssh -p 5022 " and ssh conn= ection established. But, reboot and systemctl commands hangs. Issue - https://github.com/openbmc/openbmc/issues/3701 root@tiogapass:~# dropbear -E -p 5022 [348] Jan 01 00:06:48 Failed loading /etc/dropbear/dropbear_dss_host_key [348] Jan 01 00:06:48 Failed loading /etc/dropbear/dropbear_ecdsa_host_key [348] Jan 01 00:06:48 Failed loading /etc/dropbear/dropbear_ed25519_host_ke= y [349] Jan 01 00:06:48 Running in background [root@odc ~]# ssh -p 5022 root@10.0.128.108 root@10.0.128.108's password: root@tiogapass:~# Hi George, We are facing connection issue in accessing the target after flashing the l= atest image. In openbmc-test-automation, whether any test cases are present in CI to ide= ntify these issues ? Please let us know your comments on this. Regards, Jayashree -----Original Message----- From: Jayashree D Sent: Friday, September 25, 2020 10:29 AM To: openbmc@lists.ozlabs.org Cc: Konstantin Klubnichkin ; Vijay Khemka ; geissonator@yahoo.com; joel@jms.id.au; Patrick Williams Subject: RE: Connection issue in OpenBMC image Classification: HCL Internal Hi Team, In the latest openbmc build, after image upgradation in the target, not abl= e to connect the target through SSH but able to ping the IP Address. After analysing the latest commits, reverted the below commit in the latest= build and checked by flashing the image. Now the target is connecting thro= ugh SSH. Please help us on fixing this issue. Commit Link - https://github.com/openbmc/openbmc/commit/635e0e4637e40ba03f6= 9204265427550fd404f4c Observation on UART-console after flashing latest image without any changes= : 1. reboot command is not working. 2. systemctl status is not providing any status. ( Failed to= get properties: Connection timed out) 3. I tried "ssh -vvv " and logs = are attached for working and non-working image. 4. From controller, I tried to upgrade image using redfish and image is bei= ng copied and following logs shown. root@tiogapass:~# journalctl | grep image Jan 01 00:00:37 tiogapass phospho= r-image-updater[246]: Error in mapper GetSubTreePath Jan 01 10:43:59 tiogap= ass phosphor-image-updater[246]: BMC image activating - BMC reboots are dis= abled. 5. Using Rest API command, [root@odc ]# curl -k -H "X-Auth-Token: $token" -H "Content-Type: applicatio= n/json" -X PUT -d '{"data":"xyz.openbmc_project.Software.Activation.Request= edActivations.Active"}' https://${bmc}/xyz/openbmc_project/software/a77348b= e/attr/RequestedActivation { "data": { "description": "org.freedesktop.DBus.Error.NoReply" }, "message": "Method call timed out", "status": "error" } Regards, Jayashree -----Original Message----- From: Jayashree D Sent: Friday, September 18, 2020 3:18 PM To: Patrick Williams ; openbmc@lists.ozlabs.org Cc: Konstantin Klubnichkin Subject: RE: Connection issue in OpenBMC image Classification: HCL Internal Hello Patrick, I saw the post about dropbear, but that commit was updated on July16 and my= target is connecting till August last week image. I don't think that will = be an issue. Also on working image, I tried with 'ssh -vvv ' and I got belo= w information. OpenSSH_7.4p1, OpenSSL 1.0.2k-fips 26 Jan 2017 debug1: Reading configuration data /etc/ssh/ssh_config debug1: /etc/ssh/ssh_config line 58: Applying options for * debug2: resolving "10.0.128.108" port 22 debug2: ssh_connect_direct: needpriv 0 debug1: Connecting to 10.0.128.108 [10.0.128.108] port 22. debug1: Connection established. debug1: permanently_set_uid: 0/0 debug1: key_load_public: No such file or directory debug1: identity file /root/.ssh/id_rsa type -1 debug1: key_load_public: No such file or directory debug1: identity file /root/.ssh/id_rsa-cert type -1 debug1: key_load_public: No such file or directory debug1: identity file /root/.ssh/id_dsa type -1 debug1: key_load_public: No such file or directory debug1: identity file /root/.ssh/id_dsa-cert type -1 debug1: key_load_public: No such file or directory debug1: identity file /root/.ssh/id_ecdsa type -1 debug1: key_load_public: No such file or directory debug1: identity file /root/.ssh/id_ecdsa-cert type -1 debug1: key_load_public: No such file or directory debug1: identity file /root/.ssh/id_ed25519 type -1 debug1: key_load_public: No such file or directory debug1: identity file /root/.ssh/id_ed25519-cert type -1 debug1: Enabling compatibility mode for protocol 2.0 debug1: Local version string SSH-2.0-OpenSSH_7.4 debug1: Remote protocol version 2.0, remote software version dropbear_2020.= 80 debug1: no match: dropbear_2020.80 debug2: fd 3 setting O_NONBLOCK debug1: Authenticating to 10.0.128.108:22 as 'root' debug3: hostkeys_foreach: reading file "/root/.ssh/known_hosts" debug3: record_hostkey: found key type RSA in file /root/.ssh/known_hosts:6= 8 debug3: load_hostkeys: loaded 1 keys from 10.0.128.108 debug3: order_hostkeyalgs: prefer hostkeyalgs: ssh-rsa-cert-v01@openssh.com= ,rsa-sha2-512,rsa-sha2-256,ssh-rsa debug3: send packet: type 20 debug1: SSH2_MSG_KEXINIT sent debug3: receive packet: type 20 debug1: SSH2_MSG_KEXINIT received debug2: local client KEXINIT proposal debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh= -sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-e= xchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,= diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha256,diffie-hel= lman-group14-sha1,diffie-hellman-group1-sha1,ext-info-c debug2: host key algorithms: ssh-rsa-cert-v01@openssh.com,rsa-sha2-512,rsa-= sha2-256,ssh-rsa,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp3= 84-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ssh-ed2551= 9-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecd= sa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,ssh-dss debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,a= es256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,aes192-c= bc,aes256-cbc debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,a= es256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,aes192-c= bc,aes256-cbc debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sh= a2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.= com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hm= ac-sha1 debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sh= a2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.= com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hm= ac-sha1 debug2: compression ctos: none,zlib@openssh.com,zlib debug2: compression stoc: none,zlib@openssh.com,zlib debug2: languages ctos: debug2: languages stoc: debug2: first_kex_follows 0 debug2: reserved 0 debug2: peer server KEXINIT proposal debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh= -sha2-nistp521,ecdh-sha2-nistp384,ecdh-sha2-nistp256,diffie-hellman-group14= -sha256,kexguess2@matt.ucc.asn.au debug2: host key algorithms: rsa-sha2-256,ssh-rsa debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes256-ctr debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes256-ctr debug2: MACs ctos: hmac-sha1,hmac-sha2-256 debug2: MACs stoc: hmac-sha1,hmac-sha2-256 debug2: compression ctos: zlib@openssh.com,none debug2: compression stoc: zlib@openssh.com,none debug2: languages ctos: debug2: languages stoc: debug2: first_kex_follows 0 debug2: reserved 0 debug1: kex: algorithm: curve25519-sha256 debug1: kex: host key algorithm: rsa-sha2-256 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none debug1: kex: curve25519-sha256 need=3D64 dh_need=3D64 debug1: kex: curve25519-sha256 need=3D64 dh_need=3D64 debug3: send packet: type 30 debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug3: receive packet: type 31 debug1: Server host key: ssh-rsa SHA256:3WwhPmIIxzrw0+cm/0vN3hifY4kh9sJhClV= Nw6zrJ7Y debug3: hostkeys_foreach: reading file "/root/.ssh/known_hosts" debug3: record_hostkey: found key type RSA in file /root/.ssh/known_hosts:6= 8 debug3: load_hostkeys: loaded 1 keys from 10.0.128.108 debug1: Host '10.0.128.108' is known and matches the RSA host key. debug1: Found key in /root/.ssh/known_hosts:68 debug3: send packet: type 21 debug2: set_newkeys: mode 1 debug1: rekey after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug3: receive packet: type 21 debug1: SSH2_MSG_NEWKEYS received debug2: set_newkeys: mode 0 debug1: rekey after 134217728 blocks debug2: key: /root/.ssh/id_rsa (0x558ea3ad3640), agent debug2: key: /root/.ssh/id_rsa ((nil)) debug2: key: /root/.ssh/id_dsa ((nil)) debug2: key: /root/.ssh/id_ecdsa ((nil)) debug2: key: /root/.ssh/id_ed25519 ((nil)) debug3: send packet: type 5 debug3: receive packet: type 7 debug1: SSH2_MSG_EXT_INFO received debug1: kex_input_ext_info: server-sig-algs=3D debug3: receive packet: type 6 debug2: service_accept: ssh-userauth debug1: SSH2_MSG_SERVICE_ACCEPT received debug3: send packet: type 50 debug3: receive packet: type 51 debug1: Authentications that can continue: publickey,password debug3: start over, passed a different list publickey,password debug3: preferred gssapi-keyex,gssapi-with-mic,publickey,keyboard-interacti= ve,password debug3: authmethod_lookup publickey debug3: remaining preferred: keyboard-interactive,password debug3: authmethod_is_enabled publickey debug1: Next authentication method: publickey debug1: Offering RSA public key: /root/.ssh/id_rsa debug3: send_pubkey_test debug3: send packet: type 50 debug2: we sent a publickey packet, wait for reply debug3: receive packet: type 51 debug1: Authentications that can continue: publickey,password debug1: Trying private key: /root/.ssh/id_rsa debug3: sign_and_send_pubkey: RSA SHA256:YfteufmWUV8W7EQEycZ+38skgUWGDTYFHw= 93a7SwwLM debug3: send packet: type 50 debug2: we sent a publickey packet, wait for reply debug3: receive packet: type 51 debug1: Authentications that can continue: publickey,password debug1: Trying private key: /root/.ssh/id_dsa debug3: no such identity: /root/.ssh/id_dsa: No such file or directory debug1: Trying private key: /root/.ssh/id_ecdsa debug3: no such identity: /root/.ssh/id_ecdsa: No such file or directory debug1: Trying private key: /root/.ssh/id_ed25519 debug3: no such identity: /root/.ssh/id_ed25519: No such file or directory debug2: we did not send a packet, disable method debug3: authmethod_lookup password debug3: remaining preferred: ,password debug3: authmethod_is_enabled password debug1: Next authentication method: password In non-working image, the logs are stopped after below lines and it is not = providing any errors. debug1: Enabling compatibility mode for protocol 2.0 debug1: Local version string SSH-2.0-OpenSSH_7.4 Also one more observation in UART-Console, after flashing latest image. 1. reboot command is not working. 2. systemctl status is not providing any status. ( Failed to= get properties: Connection timed out) 3. I can able to ping the ip address= but scp is not working. Thanks, Jayashree -----Original Message----- From: Patrick Williams Sent: Thursday, September 17, 2020 9:16 PM To: Jayashree D Cc: Konstantin Klubnichkin ; openbmc@lists.ozlabs.or= g Subject: Re: Connection issue in OpenBMC image Hello Jayashree, I saw an output `ssh -v` from you earlier, but there really wasn't any usef= ul information there. It looked like the connection was being made and key= s were exchanged and then the log just stopped abruptly. This tells me it = likely isn't a networking issue but an issue in the handshake between the s= sh-client (your computer) and ssh-server (dropbear). You can continue to a= dd '-v' parameters up to `ssh -vvv` and you'll get increasingly more inform= ation. Joseph Reynolds recently posted a reminder about dropbear disabling weak ci= phers[1]. Is it possible that your client is using an old cipher? On Wed, Sep 16, 2020 at 11:35:28AM +0000, Jayashree D wrote: > root@tiogapass:~# journalctl | grep drop ... > Jan 01 00:15:28 tiogapass systemd[1]: dropbear@0-10.0.128.108:22-10.0.0.1= :51810.service: Succeeded. > Jan 01 00:15:44 tiogapass dropbear[2753]: Child connection from > ::ffff:10.0.0.1:51944 Jan 01 00:15:50 tiogapass dropbear[2753]: PAM > password auth succeeded for 'root' from ::ffff:10.0.0.1:51944 This looks like a valid connection was established. > 15.09.2020, 16:12, "Jayashree D" >: > > OpenSSH_7.4p1, OpenSSL 1.0.2k-fips 26 Jan 2017 > debug1: Reading configuration data /etc/ssh/ssh_config > debug1: /etc/ssh/ssh_config line 58: Applying options for * > debug1: Connecting to 10.0.128.108 [10.0.128.108] port 22. > debug1: Connection established. > debug1: permanently_set_uid: 0/0 > debug1: key_load_public: No such file or directory > debug1: identity file /root/.ssh/id_rsa type -1 > debug1: key_load_public: No such file or directory > debug1: identity file /root/.ssh/id_rsa-cert type -1 > debug1: key_load_public: No such file or directory > debug1: identity file /root/.ssh/id_dsa type -1 > debug1: key_load_public: No such file or directory > debug1: identity file /root/.ssh/id_dsa-cert type -1 > debug1: key_load_public: No such file or directory > debug1: identity file /root/.ssh/id_ecdsa type -1 > debug1: key_load_public: No such file or directory > debug1: identity file /root/.ssh/id_ecdsa-cert type -1 > debug1: key_load_public: No such file or directory > debug1: identity file /root/.ssh/id_ed25519 type -1 > debug1: key_load_public: No such file or directory > debug1: identity file /root/.ssh/id_ed25519-cert type -1 > debug1: Enabling compatibility mode for protocol 2.0 > debug1: Local version string SSH-2.0-OpenSSH_7.4 This is the log that also looks like a good connection. Identity files wer= e attempted to be exchanged. Version strings were exchanged. And then the= log just abruptly stops. Was the connection dropped? Is it hung? 1. https://lists.ozlabs.org/pipermail/openbmc/2020-September/023071.html -- Patrick Williams ::DISCLAIMER:: ________________________________ The contents of this e-mail and any attachment(s) are confidential and inte= nded for the named recipient(s) only. E-mail transmission is not guaranteed= to be secure or error-free as information could be intercepted, corrupted,= lost, destroyed, arrive late or incomplete, or may contain viruses in tran= smission. The e mail and its contents (with or without referred errors) sha= ll therefore not attach any liability on the originator or HCL or its affil= iates. Views or opinions, if any, presented in this email are solely those = of the author and may not necessarily reflect the views or opinions of HCL = or its affiliates. Any form of reproduction, dissemination, copying, disclo= sure, modification, distribution and / or publication of this message witho= ut the prior written consent of authorized representative of HCL is strictl= y prohibited. If you have received this email in error please delete it and= notify the sender immediately. Before opening any email and/or attachments= , please check them for viruses and other defects. ________________________________