'Corrupted check bytes on input' when connecting to 1.2.30 server
Robert Trebula
trebula at ui42.com
Wed May 29 00:59:56 EST 2002
Hello,
I get this error when trying to connect to an ancient server from the 3.2.3p1
client on Linux 2.2 (OpenSSL 0.9.5):
[root at XXX openssh-3.2.3p1]# /usr/local/bin/ssh -vv LOGIN_STRIPPED at decef.elf.stuba.sk
OpenSSH_3.2.3p1, SSH protocols 1.5/2.0, OpenSSL 0x0090581f
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: Applying options for *
debug1: Rhosts Authentication disabled, originating port will not be trusted.
debug1: restore_uid
debug1: ssh_connect: getuid 0 geteuid 0 anon 1
debug1: Connecting to decef.elf.stuba.sk [147.175.111.11] port 22.
debug1: temporarily_use_uid: 0/0 (e=0)
debug1: restore_uid
debug1: temporarily_use_uid: 0/0 (e=0)
debug1: restore_uid
debug1: Connection established.
debug1: read PEM private key done: type DSA
debug1: read PEM private key done: type RSA
debug1: identity file /root/.ssh/identity type -1
debug1: identity file /root/.ssh/id_rsa type -1
debug1: identity file /root/.ssh/id_dsa type -1
debug1: Remote protocol version 1.5, remote software version 1.2.30
debug1: match: 1.2.30 pat 1.2.1*,1.2.2*,1.2.3*
debug1: Local version string SSH-1.5-OpenSSH_3.2.3p1
debug1: Waiting for server public key.
debug1: Received server public key (768 bits) and host key (1024 bits).
debug1: Host 'decef.elf.stuba.sk' is known and matches the RSA1 host key.
debug1: Found key in /root/.ssh/known_hosts:31
debug1: Encryption type: blowfish
debug1: Sent encrypted session key.
debug1: Installing crc compensation attack detector.
Disconnecting: Corrupted check bytes on input.
debug1: Calling cleanup 0x8064d54(0x0)
The machine name real, it is FreeBSD 4.1.1-RELEASE, host in my school. I guess
you can try it yourself there.
Robert
--
Bc. Robert TREBULA
ui42 spol. s r.o.
Hrdlickova 16, 831 01 Bratislava, Slovakia
tel.: (+421) 2 5479 3646
mailto:trebula at ui42.sk
http://www.ui42.com
More information about the openssh-unix-dev
mailing list