Ack...OpenSSH no longer compatible with SSH 1.2.26 clients?
Marc G. Fournier
marc.fournier at acadiau.ca
Tue Jan 4 12:43:58 EST 2000
more debug info ...
debug: sshd version OpenSSH-1.2.1
Server listening on port 22.
Generating 768 bit RSA key.
RSA key generation complete.
debug: Server will not fork when running in debugging mode.
Connection from 131.162.2.90 port 1023
debug: Client protocol version 1.5; client software version 1.2.26
debug: Sent 768 bit public key and 1024 bit host key.
debug: checksum: f5749dff
debug: stored_checksum: f5749dff
debug: Encryption type: 3des
debug: Received session key; encryption turned on.
debug: Installing crc compensation attack detector.
debug: checksum: d4323652
debug: stored_checksum: c86bfc3c
Disconnecting: Corrupted check bytes on input.
debug: Calling cleanup 0x806028c(0x0)
Definitely something out :)
On Mon, 3 Jan 2000, Damien Miller wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> On Sun, 2 Jan 2000, Marc G. Fournier wrote:
>
> > >From the code, the error is being generated in packet.c:
> >
> > ucp = (unsigned char *) buffer_ptr(&incoming_packet) + len - 4;
> > stored_checksum = GET_32BIT(ucp);
> > if (checksum != stored_checksum)
> > packet_disconnect("Corrupted check bytes on input.");
> > buffer_consume_end(&incoming_packet, 4);
> >
> > Quick suggestion, but adding the pre24 to the version string would
> > help...but, one of my other servers, I'm sure, is running pre23
> > successfully ...
> >
> > Is there maybe some file, like the random_seed file, that got corrupted
> > and needs to be removed/regenerated? I've tried redoing teh server_key
> > file several times, but that hasn't helped...
>
> I am suspecting a typedef error or similar. Could you try replacing
> the "typedef xxx yyy" with "#define yyy xxx" statements in
> defines.h?
>
> This patch should also help narrow where the problem lies:
>
> Index: packet.c
> ===================================================================
> RCS file: /var/cvs/openssh/packet.c,v
> retrieving revision 1.8
> diff -u -r1.8 packet.c
> - --- packet.c 1999/12/16 02:18:04 1.8
> +++ packet.c 2000/01/03 02:02:07
> @@ -513,6 +513,8 @@
>
> ucp = (unsigned char *) buffer_ptr(&incoming_packet) + len - 4;
> stored_checksum = GET_32BIT(ucp);
> + debug("checksum: %x", checksum);
> + debug("stored_checksum: %x", stored_checksum);
> if (checksum != stored_checksum)
> packet_disconnect("Corrupted check bytes on input.");
> buffer_consume_end(&incoming_packet, 4);
>
> Thanks,
> Damien
>
> - --
> | "Bombay is 250ms from New York in the new world order" - Alan Cox
> | Damien Miller - http://www.mindrot.org/
> | Email: djm at mindrot.org (home) -or- djm at ibs.com.au (work)
>
>
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.0.0 (GNU/Linux)
> Comment: For info see http://www.gnupg.org
>
> iD8DBQE4cAO4ormJ9RG1dI8RAmwfAKDYxG04klrx3UCLf8SB4PJ/eKiAiACgr+mt
> vM/t7fLeQla1VWKMLLLXpbI=
> =oRmt
> -----END PGP SIGNATURE-----
>
>
Marc G. Fournier marc.fournier at acadiau.ca
Senior Systems Administrator Acadia University
"These are my opinions, which are not necessarily shared by my employer"
More information about the openssh-unix-dev
mailing list