[Bug 3063] New: ssh connecting to IP address -- ssh_dispatch_run_fatal: unexpected internal error

bugzilla-daemon at bugzilla.mindrot.org bugzilla-daemon at bugzilla.mindrot.org
Thu Sep 5 00:18:06 AEST 2019


https://bugzilla.mindrot.org/show_bug.cgi?id=3063

            Bug ID: 3063
           Summary: ssh connecting to IP address --
                    ssh_dispatch_run_fatal: unexpected internal error
           Product: Portable OpenSSH
           Version: -current
          Hardware: ix86
                OS: Mac OS X
            Status: NEW
          Severity: major
          Priority: P5
         Component: ssh
          Assignee: unassigned-bugs at mindrot.org
          Reporter: warren at lavall.ee

Created attachment 3317
  --> https://bugzilla.mindrot.org/attachment.cgi?id=3317&action=edit
Config.log

When connecting via the latest SSH from git, compiled on a Mac against
libressl, connecting to an IP address with ssh commandline throws an
error:

./ssh 192.168.61.230
ssh_dispatch_run_fatal: Connection to 192.168.61.230 port 22:
unexpected internal error

But the FQDN works fine:
509 bash$ ./ssh ntp
Linux ntp 4.19.50+ #1234 Thu Jun 13 10:47:38 BST 2019 armv6l
....


sftp does work however --

510 bash$ ./sftp 192.168.61.230
*********************************************************************
This resource, including all related equipment, networks and network
devices, are provided for authorized use. Computer systems may be
monitored for all lawful purposes, including to ensure authorized
use, for management of the system, to facilitate protection against
unauthorized access and to verify security procedures and operational
procedures.  The monitoring on this system may include audits by
authorized personnel to test or verify the validity, security and
survivability of this system. During monitoring information may be
examined, recorded, copied and used for authorized purposes. All
information placed on or sent to this system may be subject to such
monitoring procedures.  Use of this computer system, authorized or
unauthorized, constitutes consent to this policy and the policies and
procedures set forth by System Owner.  Evidence of unauthorized use
collected during monitoring may be used for criminal prosecution
by System staff, legal counsel and law enforcement agencies.
*********************************************************************
Connected to 192.168.61.230.
sftp>

This bug has existed for several weeks.

511 bash$ ./ssh -V
OpenSSH_8.0p1, LibreSSL 3.0.0

-- 
You are receiving this mail because:
You are watching the assignee of the bug.


More information about the openssh-bugs mailing list