Ack...OpenSSH no longer compatible with SSH 1.2.26 clients?

Marc G. Fournier marc.fournier at acadiau.ca
Tue Jan 4 12:43:58 EST 2000


more debug info ...

debug: sshd version OpenSSH-1.2.1
Server listening on port 22.
Generating 768 bit RSA key.
RSA key generation complete.
debug: Server will not fork when running in debugging mode.
Connection from 131.162.2.90 port 1023
debug: Client protocol version 1.5; client software version 1.2.26
debug: Sent 768 bit public key and 1024 bit host key.
debug: checksum: f5749dff
debug: stored_checksum: f5749dff
debug: Encryption type: 3des
debug: Received session key; encryption turned on.
debug: Installing crc compensation attack detector.
debug: checksum: d4323652
debug: stored_checksum: c86bfc3c
Disconnecting: Corrupted check bytes on input.
debug: Calling cleanup 0x806028c(0x0)

Definitely something out :)


On Mon, 3 Jan 2000, Damien Miller wrote:

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> On Sun, 2 Jan 2000, Marc G. Fournier wrote:
> 
> > >From the code, the error is being generated in packet.c:
> > 
> >         ucp = (unsigned char *) buffer_ptr(&incoming_packet) + len - 4;
> >         stored_checksum = GET_32BIT(ucp);
> >         if (checksum != stored_checksum)
> >                 packet_disconnect("Corrupted check bytes on input.");
> >         buffer_consume_end(&incoming_packet, 4);
> > 
> > Quick suggestion, but adding the pre24 to the version string would
> > help...but, one of my other servers, I'm sure, is running pre23
> > successfully ...
> > 
> > Is there maybe some file, like the random_seed file, that got corrupted
> > and needs to be removed/regenerated?  I've tried redoing teh server_key
> > file several times, but that hasn't helped...
> 
> I am suspecting a typedef error or similar. Could you try replacing
> the "typedef xxx yyy" with "#define yyy xxx" statements in 
> defines.h?
> 
> This patch should also help narrow where the problem lies:
> 
> Index: packet.c
> ===================================================================
> RCS file: /var/cvs/openssh/packet.c,v
> retrieving revision 1.8
> diff -u -r1.8 packet.c
> - --- packet.c	1999/12/16 02:18:04	1.8
> +++ packet.c	2000/01/03 02:02:07
> @@ -513,6 +513,8 @@
>  
>  	ucp = (unsigned char *) buffer_ptr(&incoming_packet) + len - 4;
>  	stored_checksum = GET_32BIT(ucp);
> +	debug("checksum: %x", checksum);
> +	debug("stored_checksum: %x", stored_checksum);
>  	if (checksum != stored_checksum)
>  		packet_disconnect("Corrupted check bytes on input.");
>  	buffer_consume_end(&incoming_packet, 4);
> 
> Thanks,
> Damien
> 
> - --
> | "Bombay is 250ms from New York in the new world order" - Alan Cox
> | Damien Miller - http://www.mindrot.org/
> | Email: djm at mindrot.org (home) -or- djm at ibs.com.au (work)
> 
> 
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.0.0 (GNU/Linux)
> Comment: For info see http://www.gnupg.org
> 
> iD8DBQE4cAO4ormJ9RG1dI8RAmwfAKDYxG04klrx3UCLf8SB4PJ/eKiAiACgr+mt
> vM/t7fLeQla1VWKMLLLXpbI=
> =oRmt
> -----END PGP SIGNATURE-----
> 
> 

Marc G. Fournier                                 marc.fournier at acadiau.ca
Senior Systems Administrator                            Acadia University

  "These are my opinions, which are not necessarily shared by my employer"






More information about the openssh-unix-dev mailing list