Exit status 141

Discussion of Co:Z sftp, a port of OpenSSH sftp for z/OS
Post Reply
Marc
Posts: 9
Joined: Thu Sep 04, 2014 5:25 am

Exit status 141

Post by Marc »

Hello,
While trying to transfert a file from lpar UEE2 to LPAR UED2 I get Exit status 141 that I don't understand.
The SFTP session log is not created, I can't find any message that could help.
Any idea about this exit status ?

I think I installed CoZ on all LPAR in a same way...

Thank you

Marc.

Code: Select all

1
 Co:Z SFTP version: 3.0.0 (5.0p1) 2014-11-12
 Copyright (C) Dovetailed Technologies, LLC. 2008-2014. All rights reserved.
  85.788~ debug3: connect_to_server arg=/bin/ssh
  85.788~ debug3: connect_to_server arg=-oForwardX11 no
  85.788~ debug3: connect_to_server arg=-oForwardAgent no
  85.788~ debug3: connect_to_server arg=-oClearAllForwardings yes
  85.788~ debug3: connect_to_server arg=-oPort=22
  85.788~ debug3: connect_to_server arg=-v
  85.788~ debug3: connect_to_server arg=-v
  85.788~ debug3: connect_to_server arg=-v
  85.788~ debug3: connect_to_server arg=-oConnectTimeout=60
  85.788~ debug3: connect_to_server arg=-oServerAliveInterval=60
  85.788~ debug3: connect_to_server arg=-oStrictHostKeyChecking=no
  85.788~ debug3: connect_to_server arg=-obatchmode yes
  85.788~ debug3: connect_to_server arg=-lUFTFXD2
  85.788~ debug3: connect_to_server arg=-oProtocol 2
  85.788~ debug3: connect_to_server arg=-s
  85.788~ debug3: connect_to_server arg=UED2
  85.788~ debug3: connect_to_server arg=sftp
  85.795~ debug2: setting ssh _CEE_RUNOPTS=HEAP(12M,1M,,FREE),ENVAR("_CEE_REALLOC_CONTROL=256K,25")
 OpenSSH_5.0p1, OpenSSL 1.0.1c 10 May 2012
 debug1: Reading configuration data /etc/ssh/ssh_config
+
 debug1: Reading configuration data /etc/ssh/zos_ssh_config
+
 debug3: Seeding PRNG from /usr/lib/ssh/ssh-rand-helper
+
 debug1: zsshSmfSetConnSmfStatus: SMF status is 0
+
 debug1: Rhosts Authentication disabled, originating port will not be trusted.
+
 debug2: ssh_connect: needpriv 0
+
 debug1: Connecting to UED2  172.24.24.18~ port 22.
+
 debug2: fd 3 setting O_NONBLOCK
+
 debug1: fd 3 clearing O_NONBLOCK
+
 debug1: Connection established.
+
 debug1: cipher_init: none from source OpenSSL
+
 debug1: cipher_init: none from source OpenSSL
+
 debug3: timeout: 60000 ms remain after connect
+
 debug3: zsshGetpw: passwd name=UFTFXE2, uid=3001000, gid=1001000, dir=/ued/user/UFTFXE2, shell=/bin/sh
+
 debug3: Not a RSA1 key file /ued/user/UFTFXE2/.ssh/id_rsa.
+
 debug2: key_type_from_name: unknown key type '-----BEGIN'
+
 debug3: key_read: missing keytype
+
 debug3: key_read: missing whitespace
+
 debug3: key_read: missing whitespace
+
 debug3: key_read: missing whitespace
+
 debug3: key_read: missing whitespace
+
 debug3: key_read: missing whitespace
+
 debug3: key_read: missing whitespace
+
 debug3: key_read: missing whitespace
+
 debug3: key_read: missing whitespace
+
 debug3: key_read: missing whitespace
+
 debug3: key_read: missing whitespace
+
 debug3: key_read: missing whitespace
+
 debug3: key_read: missing whitespace
+
 debug3: key_read: missing whitespace
+
 debug3: key_read: missing whitespace
+
 debug3: key_read: missing whitespace
+
 debug3: key_read: missing whitespace
+
 debug3: key_read: missing whitespace
+
 debug3: key_read: missing whitespace
+
 debug3: key_read: missing whitespace
+
 debug3: key_read: missing whitespace
+
 debug3: key_read: missing whitespace
+
 debug3: key_read: missing whitespace
+
 debug3: key_read: missing whitespace
+
 debug3: key_read: missing whitespace
+
 debug3: key_read: missing whitespace
+
 debug2: key_type_from_name: unknown key type '-----END'
+
 debug3: key_read: missing keytype
+
 debug1: identity file /ued/user/UFTFXE2/.ssh/id_rsa type 1
+
 debug1: identity file /ued/user/UFTFXE2/.ssh/id_dsa type -1
+
 debug1: Remote protocol version 2.0, remote software version OpenSSH_5.0
+
 debug1: match: OpenSSH_5.0 pat OpenSSH*
+
 debug1: Enabling compatibility mode for protocol 2.0
+
 debug1: Local version string SSH-2.0-OpenSSH_5.0
+
 debug2: fd 3 setting O_NONBLOCK
+
 debug3: RNG is ready, skipping seeding
+
 debug1: SSH2_MSG_KEXINIT sent
+
 debug1: SSH2_MSG_KEXINIT received
+
 debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffi
 e-hellman-group1-sha1
+
 debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
+
 debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes19
 2-cbc,aes256-cbc,arcfour,rijndael-cbcàlysator.liu.se
+
 debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes19
 2-cbc,aes256-cbc,arcfour,rijndael-cbcàlysator.liu.se
+
 debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64àopenssh.com,hmac-ripemd160,hmac-ripemd160àopenssh.com,hmac-sha1-96,hmac-md5-96
+
 debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64àopenssh.com,hmac-ripemd160,hmac-ripemd160àopenssh.com,hmac-sha1-96,hmac-md5-96
+
 debug2: kex_parse_kexinit: none,zlibàopenssh.com,zlib
+
 debug2: kex_parse_kexinit: none,zlibàopenssh.com,zlib
+
 debug2: kex_parse_kexinit: 
+
 debug2: kex_parse_kexinit: 
+
 debug2: kex_parse_kexinit: first_kex_follows 0 
+
 debug2: kex_parse_kexinit: reserved 0 
+
 debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffi
 e-hellman-group1-sha1
+
 debug2: kex_parse_kexinit: ssh-rsa
+
 debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes19
 2-cbc,aes256-cbc,arcfour,rijndael-cbcàlysator.liu.se
+
 debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes19
 2-cbc,aes256-cbc,arcfour,rijndael-cbcàlysator.liu.se
+
 debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64àopenssh.com,hmac-ripemd160,hmac-ripemd160àopenssh.com,hmac-sha1-96,hmac-md5-96
+
 debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64àopenssh.com,hmac-ripemd160,hmac-ripemd160àopenssh.com,hmac-sha1-96,hmac-md5-96
+
 debug2: kex_parse_kexinit: none
+
 debug2: kex_parse_kexinit: none
+
 debug2: kex_parse_kexinit: 
+
 debug2: kex_parse_kexinit: 
+
 debug2: kex_parse_kexinit: first_kex_follows 0 
+
 debug2: kex_parse_kexinit: reserved 0 
+
 debug1: mac_setup_by_id: hmac-md5 from source OpenSSL
+
 debug2: mac_setup: found hmac-md5
+
 debug1: kex: server->client aes128-ctr hmac-md5 none
+
 debug1: mac_setup_by_id: hmac-md5 from source OpenSSL
+
 debug2: mac_setup: found hmac-md5
+
 debug1: kex: client->server aes128-ctr hmac-md5 none
+
 debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent
+
 debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
+
 debug2: dh_gen_key: priv key bits set: 124/256
+
 debug2: bits set: 491/1024
+
 debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
+
 debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
+
 debug3: check_host_in_hostfile: filename /ued/user/UFTFXE2/.ssh/known_hosts
+
 debug3: check_host_in_hostfile: match line 2
+
 debug3: check_host_in_hostfile: filename /ued/user/UFTFXE2/.ssh/known_hosts
+
 debug3: check_host_in_hostfile: match line 2
+
 debug1: Host 'ued2' is known and matches the RSA host key.
+
 debug1: Found key in /ued/user/UFTFXE2/.ssh/known_hosts:2
+
 debug2: bits set: 555/1024
+
 debug1: ssh_rsa_verify: signature correct
+
 debug2: kex_derive_keys
+
 debug2: set_newkeys: mode 1
+
 debug1: cipher_init: aes128-ctr from source OpenSSL
+
 debug1: SSH2_MSG_NEWKEYS sent
+
 debug1: expecting SSH2_MSG_NEWKEYS
+
 debug2: set_newkeys: mode 0
+
 debug1: cipher_init: aes128-ctr from source OpenSSL
+
 debug1: SSH2_MSG_NEWKEYS received
+
 debug1: SSH2_MSG_SERVICE_REQUEST sent
+
 debug2: service_accept: ssh-userauth
+
 debug1: SSH2_MSG_SERVICE_ACCEPT received
+
 debug2: key: /ued/user/UFTFXE2/.ssh/id_rsa (16030628)
+
 debug2: key: /ued/user/UFTFXE2/.ssh/id_dsa (0)
+
 debug1: Authentications that can continue: publickey,password
+
 debug3: start over, passed a different list publickey,password
+
 debug3: preferred publickey
+
 debug3: authmethod_lookup publickey
+
 debug3: remaining preferred: 
+
 debug3: authmethod_is_enabled publickey
+
 debug1: Next authentication method: publickey
+
 debug1: Offering public key: /ued/user/UFTFXE2/.ssh/id_rsa
+
 debug3: send_pubkey_test
+
 debug2: we sent a publickey packet, wait for reply
+
 debug1: Server accepts key: pkalg ssh-rsa blen 277
+
 debug2: input_userauth_pk_ok: fp 33:60:f1:99:46:02:c1:1d:e8:69:0d:ef:fe:0c:a8:6d
+
 debug3: sign_and_send_pubkey
+
 debug1: read PEM private key done: type RSA
+
 debug1: Authentication succeeded (publickey).
+
 debug2: fd 4 setting O_NONBLOCK
+
 debug2: fd 5 setting O_NONBLOCK
+
 debug2: fd 6 setting O_NONBLOCK
+
 debug1: channel 0: new  client-session~
+
 debug3: ssh_session2_open: channel_new: 0
+
 debug2: channel 0: send open
+
 debug1: Entering interactive session.
+
 debug2: callback start
+
 debug2: client_session2_setup: id 0
+
 debug1: Sending subsystem: sftp
+
 debug2: channel 0: request subsystem confirm 1
+
 debug2: fd 3 setting TCP_NODELAY
+
 debug2: callback done
+
 debug2: channel 0: open confirm rwindow 0 rmax 32768
+
 debug2: channel 0: rcvd adjust 2097152
+
 debug1: client_input_channel_req: channel 0 rtype exit-status reply 0
+
 debug2: channel 0: rcvd eof
+
 debug2: channel 0: output open -> drain
+
 debug2: channel 0: obuf empty
+
 debug2: channel 0: close_write
+
 debug2: channel 0: output drain -> closed
+
 debug2: channel 0: rcvd close
+
 debug2: channel 0: close_read
+
 debug2: channel 0: input open -> closed
+
 debug3: channel 0: will not send data after close
+
 debug2: channel 0: almost dead
+
 debug2: channel 0: gc: notify user
+
 debug2: channel 0: gc: user detached
+
 debug2: channel 0: send close
+
 debug2: channel 0: is dead
+
 debug2: channel 0: garbage collecting
+
 debug1: channel 0: free: client-session, nchannels 1
+
 debug3: channel 0: status: The following connections are open:
+
   £0 client-session (t4 r0 i3/0 o3/0 fd -1/-1 cfd -1)
+
 
+
 debug3: channel 0: close_fds r -1 w -1 e 6 c -1
+
 debug1: fd 0 clearing O_NONBLOCK
+
 debug1: fd 1 clearing O_NONBLOCK
+
 debug1: fd 2 clearing O_NONBLOCK
+
 debug1: Transferred: stdin 0, stdout 0, stderr 0 bytes in 0.1 seconds
+
 debug1: Bytes per second: stdin 0.0, stdout 0.0, stderr 0.0
+
 debug1: Exit status 141
+
  88.675~ Connection closed

Marc
Posts: 9
Joined: Thu Sep 04, 2014 5:25 am

Re: Exit status 141

Post by Marc »

Hi,
.ssh/authorized_keys was not owned by UID(0). Changed this, it did the trick...
Post Reply