Ack...OpenSSH no longer compatible with SSH 1.2.26 clients?
Marc G. Fournier
marc.fournier at acadiau.ca
Tue Jan 4 12:33:13 EST 2000
If you are referring to:
/* If sys/types.h does not supply u_intXX_t, supply them ourselves */
#ifndef HAVE_U_INTXX_T
# ifdef HAVE_UINTXX_T
# define u_int16_t uint16_t;
# define u_int32_t uint32_t;
# define u_int64_t uint64_t;
# define HAVE_U_INTXX_T 1
# else
It produces:
gcc -g -O2 -Wall -I/usr/slocal/include -DETCDIR=\"/usr/local/etc\"
-DSSH_PROGRAM=\"/usr/slocal/bin/ssh\"
-DSSH_ASKPASS_DEFAULT=\"/usr/slocal/libexec/ssh/ssh-askpass\"
-DHAVE_CONFIG_H -c authfile.c -o authfile.o
authfile.c: In function `save_private_key':
authfile.c:52: warning: useless keyword or type name in empty declaration
authfile.c:52: warning: empty declaration
authfile.c:52: warning: statement with no effect
authfile.c:67: invalid lvalue in assignment
authfile.c:68: invalid operands to binary &
authfile.c:69: invalid operands to binary >>
authfile.c: In function `load_private_key':
authfile.c:238: warning: unsigned int format, long unsigned int arg (arg
2)
On Mon, 3 Jan 2000, Damien Miller wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> On Sun, 2 Jan 2000, Marc G. Fournier wrote:
>
> > >From the code, the error is being generated in packet.c:
> >
> > ucp = (unsigned char *) buffer_ptr(&incoming_packet) + len - 4;
> > stored_checksum = GET_32BIT(ucp);
> > if (checksum != stored_checksum)
> > packet_disconnect("Corrupted check bytes on input.");
> > buffer_consume_end(&incoming_packet, 4);
> >
> > Quick suggestion, but adding the pre24 to the version string would
> > help...but, one of my other servers, I'm sure, is running pre23
> > successfully ...
> >
> > Is there maybe some file, like the random_seed file, that got corrupted
> > and needs to be removed/regenerated? I've tried redoing teh server_key
> > file several times, but that hasn't helped...
>
> I am suspecting a typedef error or similar. Could you try replacing
> the "typedef xxx yyy" with "#define yyy xxx" statements in
> defines.h?
>
> This patch should also help narrow where the problem lies:
>
> Index: packet.c
> ===================================================================
> RCS file: /var/cvs/openssh/packet.c,v
> retrieving revision 1.8
> diff -u -r1.8 packet.c
> - --- packet.c 1999/12/16 02:18:04 1.8
> +++ packet.c 2000/01/03 02:02:07
> @@ -513,6 +513,8 @@
>
> ucp = (unsigned char *) buffer_ptr(&incoming_packet) + len - 4;
> stored_checksum = GET_32BIT(ucp);
> + debug("checksum: %x", checksum);
> + debug("stored_checksum: %x", stored_checksum);
> if (checksum != stored_checksum)
> packet_disconnect("Corrupted check bytes on input.");
> buffer_consume_end(&incoming_packet, 4);
>
> Thanks,
> Damien
>
> - --
> | "Bombay is 250ms from New York in the new world order" - Alan Cox
> | Damien Miller - http://www.mindrot.org/
> | Email: djm at mindrot.org (home) -or- djm at ibs.com.au (work)
>
>
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.0.0 (GNU/Linux)
> Comment: For info see http://www.gnupg.org
>
> iD8DBQE4cAO4ormJ9RG1dI8RAmwfAKDYxG04klrx3UCLf8SB4PJ/eKiAiACgr+mt
> vM/t7fLeQla1VWKMLLLXpbI=
> =oRmt
> -----END PGP SIGNATURE-----
>
>
Marc G. Fournier marc.fournier at acadiau.ca
Senior Systems Administrator Acadia University
"These are my opinions, which are not necessarily shared by my employer"
More information about the openssh-unix-dev
mailing list