[Bug 297] New: sshd version 3.3 incompatible with pre-3.3 clients in ssh1 mode

bugzilla-daemon at mindrot.org bugzilla-daemon at mindrot.org
Wed Jun 26 02:31:55 EST 2002


http://bugzilla.mindrot.org/show_bug.cgi?id=297

           Summary: sshd version 3.3 incompatible with pre-3.3 clients in
                    ssh1 mode
           Product: Portable OpenSSH
           Version: -current
          Platform: ix86
        OS/Version: Linux
            Status: NEW
          Severity: normal
          Priority: P2
         Component: sshd
        AssignedTo: openssh-unix-dev at mindrot.org
        ReportedBy: henrik-sshbugzilla at hswn.dk


After installing the 3.3p1 release on our webserver, I have received a couple of
reports from users who can no longer login.

It seems to be a problem only when using ssh v1 protocol. The connection is
terminated with a message "Disconnecting: Corrupted check bytes on input."

The output from "ssh -v1" is:
$ ssh -v -1 sslug.dk
OpenSSH_2.9p2, SSH protocols 1.5/2.0, OpenSSL 0x0090602f
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: Applying options for *
debug1: Seeding random number generator
debug1: Rhosts Authentication disabled, originating port will not be
trusted.
debug1: restore_uid
debug1: ssh_connect: getuid 501 geteuid 0 anon 1
debug1: Connecting to sslug.dk [130.228.2.150] port 22.
debug1: temporarily_use_uid: 501/504 (e=0)
debug1: restore_uid
debug1: temporarily_use_uid: 501/504 (e=0)
debug1: restore_uid
debug1: Connection established.
debug1: read PEM private key done: type DSA
debug1: read PEM private key done: type RSA
debug1: identity file /home/tange/.ssh/identity type 0
debug1: Remote protocol version 1.99, remote software version OpenSSH_3.3
debug1: match: OpenSSH_3.3 pat ^OpenSSH
debug1: Local version string SSH-1.5-OpenSSH_2.9p2
debug1: Waiting for server public key.
debug1: Received server public key (768 bits) and host key (1024 bits).
debug1: Host 'sslug.dk' is known and matches the RSA1 host key.
debug1: Found key in /home/tange/.ssh/known_hosts:3
debug1: Encryption type: blowfish
debug1: Sent encrypted session key.
debug1: Installing crc compensation attack detector.
Disconnecting: Corrupted check bytes on input.
debug1: Calling cleanup 0x8067590(0x0)

I have an identical report from a user running a 3.1p1 client. However, I cannot
reproduce it myself with neither a 3.3p1 nor a 3.1p1 client.

The logs on the server does not indicate anything unusual.

Server is a heavily patched Red Hat 6.2 installation, running a Linux
2.4.19-pre10 kernel with OpenSSH 3.3p1 (rebuilt from the openssh.com
distribution). UsePrivilegeSeparation is enabled.



------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.



More information about the openssh-unix-dev mailing list