[Bug 3729] New: the new sshd does not work under the supervision of inetd

bugzilla-daemon at mindrot.org bugzilla-daemon at mindrot.org
Fri Sep 6 22:21:44 AEST 2024


https://bugzilla.mindrot.org/show_bug.cgi?id=3729

            Bug ID: 3729
           Summary: the new sshd does not work under the supervision of
                    inetd
           Product: Portable OpenSSH
           Version: 9.8p1
          Hardware: ARM
                OS: Linux
            Status: NEW
          Severity: major
          Priority: P5
         Component: sshd
          Assignee: unassigned-bugs at mindrot.org
          Reporter: khalid.outaali at nav-timing.safrangroup.com

**Bug Description:**

When attempting to connect via SSH, I consistently receive the
following error message:

```
kex_exchange_identification: read: Connection reset by peer
```

This issue occurs **only when running `sshd` in inetd mode using the
`-i` option** (either under `xinetd` or similar super-server
configurations). However, when running the `sshd` service independently
(via `sshd.service` under systemd or manually), connections are
established successfully without errors.

---

**Steps to Reproduce:**

1. Configure `sshd` to run in inetd mode using the `-i` option (e.g.,
in `xinetd.conf` or triggered via systemd socket activation).
2. Attempt to connect to the SSH server using an SSH client.
3. Observe that the connection fails with the error
`kex_exchange_identification: read: Connection reset by peer`.

---

**Expected Behavior:**

SSH connections should be successfully established in inetd mode, just
as they are when `sshd` is run independently without the `-i` option.

---

**Actual Behavior:**

SSH connections fail with the error:

```
kex_exchange_identification: read: Connection reset by peer
```

This only happens when `sshd` is run in inetd mode using the `-i`
option. Running the `sshd` service outside of inetd (e.g.,
systemd-based `sshd.service`) works as expected without any connection
issues.

-- 
You are receiving this mail because:
You are watching the assignee of the bug.


More information about the openssh-bugs mailing list